Saturday, March 9, 2019
Edward Snowden Essay
On June 6, 2013 The Guardian newspaper printed a story whollyeging that the National guarantor Agency (NSA) was collecting telephone records of millions of Verizon customers in a top underground governance sanctioned program. This would be just the firstly glimpse at the m some(prenominal) disturbing actions revealed by a man named Edward Snowden, a fountain Central Intelligence Agency (CIA) employee and NSA contractor who used his computer valor and security clearance to collect information about how the United States government has been monitoring its own citizens. Mr. Snowdens actions have prompted the government to file illegal charges against him including theft of government property and espionage. This situation raises serious questions about the faithfulness and ethicality of government oversight programs as well as security of private information.There has al right smarts been a debate over the trade-off between privacy and security, and this is a perfect example of that discussion. This is an anesthetise that affects anyone who utilizes the technological advancements of today, heedless of the criminality (or lack thitherof) of their actions. To better catch this issue we subjective first take a look at the laws that govern c be and the laws that protects our exclusive independence from unwarranted direction. Two of the most important documents that focus on these issues are the ordinal Amendment to the US Constitution, which protects Ameri gages against unwarranted surveillance, and the Electronic communication theory hiding Act, which was instituted in 1986 as an update to the law governing government wiretapping programs.Since the issue at hand regards government surveillance in general and the Fourth Amendment was written to protect Americans from this act, it is worth quoting in full The right of the flock to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be v iolated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place tobe searched, and the persons or things to be seized. According to Jackson Lears (2013), the bill of fare of Governors Professor of History at Rutgers University and Editor in Chief of the Raritan quarterly Review, this Amendment was written by men who had rejected imperial power and were unconquerable to prevent its reassertion in their new nationNothing could more(prenominal) flagrantly violate those requirements than the NSA dragnet (p. 4).Although our Constitution was written almost 230 old age ago, and the men who wrote this document could not have possibly foreseen the technological advancements that would be made in that time (i.e. the telephone, nuclear weapons or the Internet), they were witness to the sophisticate of government power and tried to institute broad principles to mitigate the misadventure of their new government becomi ng corrupt in that way. The problem our rude faces, merely, is that in order to regulate this type of behavior it must first be known, which until Edward Snowden appeared had only been considered speculative, and then addressed (Richards, 2013, p. 1934).The government has made attempts, however feeble, at implementing additional laws to prevent this type of abuse of power in the past, but has not kept up with the times when it comes to updating these safeguards. The imperious Court ruled in 1928 that warrantless wiretapping was not illegal, but that ruling was worried in 1967 and it was not until 1968 that Congress passed legislation governing wiretapping. In the kindred fashion, the Electronic Communications Privacy Act was passed in 1986 as an amendment to the solicit Act, but has not been updated in the nearly 30 years since it was enacted (Freiwald & Mtille, 2013, p. 1291).The only two times Congress has clarified what may or not be done in conjunction with the Electronic Communications Privacy Act was in 1994 with the passing of the Communications Assistance for jurisprudence Enforcement Act and the Patriot Act (passed in 2001 only 6 weeks afterward the attacks on September 11), which both further eased the restrictions on law enforcement surveillance (Freiwald & Mtille, 2013, p. 1292) and ensuredd that providers of telecommunications services maintained the accessibility of their systems to wiretapping (Freiwald & Mtille, 2013, p. 1293). Friewald and Mtille (2013) also explain that surveillance that proceeds outside the bounds of the ECPA (and think statutes), either by virtue of not being historically covered, or byvirtue of being too new to be included, can proceed without any judicial review, so long as a court has not yet held that the Fourth Amendment requires regulation (p. 1295-1296). The question we must ask is whether or not this type of surveillance is necessarily on the hook(predicate) or if it is necessary to protect our country and national security.According to Neil Richards (2013), First, surveillance is harmful because it can chill the exercise of our civil libertiesSecond, we must tell that secret surveillance is illegitimate and prohibit the creation of any domestic-surveillance programs whose mankind is secretThird, we should recognize that total surveillance is illegitimate and reject the theme that it is strikeable for the government to record all Internet activity without say-so (p. 1935-1936). The first predilection that Richards raises deal with our civil liberties such as freedom of speech. When people are constantly under the fear of government surveillance, they may be less likely to speak their mind when they disagree with humankind policy because they may fear retaliation or retribution for their dissent.The wink point of secret surveillance deals with the idea of accountability for those who are playing the surveillance. If a blank check is written by Congress for surveillance with n o oversight as to what surveillance is being performed, then there can be no guarantee that the people performing the surveillance are not violating our personal privacy. If the government wants its people to self-assurance them, then they should be comfortable with the idea of trust but as veritable. Finally, the idea of total surveillance is the most concrete example of the ravishment of the Fourth Amendment which requires probably cause as a basis for any intrusive action by the government.I am not against the idea of surveillance, especially in the dangerous world we live in, but at the same time we must find a balance and get wind our limits. In order to preserve our individual freedoms we must be impulsive to accept a certain level of hazard and a certain level of personal responsibility. The level of personal responsibility we must accept is to be willing, and able, to defend ourselves without relying on the government to do it for us all the time. One example of this is the attacks ofSeptember 11, 2001 where 4 planes were hijacked and used as weapons. come to the fore of these 4 planes, only the passengers of one, United flight 93, were willing to stand up for themselves against the hijackers. If the hijackers knew that the passengers on each and every plane would have acted with the bravery and endurance of those on the United flight, I doubt they would have hijacked any of them.As far as accepting a certain level of insecurity goes, that is just a part of life there is no way we can prevent every horrible thing from happening. I understand the human desire to prevent bad things from happening, but what cost are we willing to pay for it? If we want to prevent car accidents that occur from deer running into the road, does that mean we should kill all the deer? In the linguistic process of Benjamin Franklin, one of our Founding Fathers and signatories of our Constitution, They who can give up essential liberty to obtain a little temporary safet y merit neither liberty nor safety.ReferencesLears, J. (2013). EDITORS NOTE. Raritan, 33(1), 1-6. Retrieved from EBSCOhost. Richards, N. M. (2013). THE DANGERS OF superintendence. Harvard Law Review, 126(7), 1934-1965. Retrieved from EBSCOhost. Freiwald, S., & Mtille, S. (2013). REFORMING SURVEILLANCE LAW THE SWISS MODEL. Berkeley Technology Law Journal, 28(2), 1261-1332. Retrieved from EBSCOhost.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment