Premium Essay

Do Government Internet Surveillance Efforts Threaten Privacy and Civil Rights?

In:

Submitted By Shars09
Words 654
Pages 3
In regards to Issue 16 Unit 5 in the textbook, I strongly agree that government Internet surveillance efforts threaten privacy and civil rights. It is a basic human right to allow someone to keep something secret to oneself. We owe no explanation or clarification to anyone for our private matters. With the governments increasing efforts in Internet surveillance this basic right is violated. It is as if we have become completely transparent to people we know nothing about ourselves. New technological tools are vulnerable to exploitation by governments aiming to crush dissent and deny human rights. All governments struggle to balance a need to deal with serious issues such as security, hate speech and child safety for their citizens but in repressive societies, these concerns often serve as convenient pretext to engage in censorship or surveillance of the internet that violates the rights and privacy of users and threatens the free flow of information. We all are aware that he internet and other communication technologies have created a vast amount of opportunities to share information, opening-up paths for pro democracy groups, activists, journalists and individuals around the world to share their opinion and judgment on various policies made by their respective government. I understand why monitoring people’s activity may seem as the right thing to do to ensure security but it is not of utmost importance; there are various other problems that need to be fixed at grass-root levels rather than monitoring people’s activity over the internet and in turn violating their freedom of speech. James A. Lewis provides his argument in our textbook on why Internet surveillance threatens human and privacy rights. He argues that legislations like the Cyber security Act of 2009 were not written with security in mind. They expected a self-governing commons to emerge, which did

Similar Documents

Premium Essay

Mobile Technology and Privacy

...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...

Words: 7224 - Pages: 29

Free Essay

You Are Being Watched

...The  unsettling  thing  about  living  in  a   surveillance  society  is  not  just  that   you  are  being  watched.  It  is  that  you   have  no  idea.       M a r i n e   D r o u a r t               L E A 3             L a e t i t i a   F o u r e u r               INDEX Introduction 3 I. A. B. You are Being Watched in Popular Culture The Firm by John Grisham Surveillance in Other Works 3 3 4 II. A. B. C. Surveillance in Daily Lives History Different Kinds of Surveillance Regulation of The Surveillance 5 5 7 14 III. A. B. Reversal of The Situation: Everyone can Watch One Another Exhibitionism Voyeurism 17 17 19 Conclusion 21 SOURCES 22         2         Introduction: Our freedom is always under electronic surveillance. Computer technologies have increased; this is what specialists call "traceability". Our operations, our conversations, our tastes and interests leave traces in the multiple computer systems that manage our daily lives. All these data are collected, centralized and stored by public or private organizations that can know at any time the "profile" of each individual. Every day in so many ways we are being watched. We are told it is for our own good, our own protection, to make our lives better, but is...

Words: 5798 - Pages: 24

Free Essay

Military Law

...Military Law Seminar Fall, 2014 Article The Influence of Social Media on Homegrown Terrorists and Balancing Data-mining Between Civil Liberties and National Security Julianne Grim [Insert Abstract] [The focus of this article will be narrowly tailored to include the most popular social media sites in the western world, Facebook, Twitter and YouTube and how they are utilized by known terrorist organizations Al-Qaeda and Islamic State (ISIS/ISIL)] I. The Developing World of Social Media Social media activity accounts for over 22 percent of all time spent online in the United States, making it the number one activity people do on the internet. However, the world of social media extends beyond Facebook Twitter and YouTube. Social networking sites are developing faster than they can be analyzed and popping up all over the world. But social media is not a new phenomenon either, people have been seeking out like minded individuals in online communities for nearly two decades. During the infancy stages of social media people logged onto forums, blogs, chat rooms etc. Each social media platform varies slightly from the next - allowing for different types of content to be generated - but each platform seeks to accomplish two goals; generating content and engaging with other interested people. Modern terrorists are taking advantage of the fruits of globalization and modern technology, especially advanced online communication technologies that are used to plan...

Words: 5398 - Pages: 22

Premium Essay

Management and Information Systems

...guide ethical decisions. 3. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. 4. Assess how information systems have affected everyday life. CHAPTER OUTLINE 4.1 UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS A Model for Thinking About Ethical, Social, and Political Issues Five Moral Dimensions of the Information Age Key Technology Trends that Raise Ethical Issues ETHICS IN AN INFORMATION SOCIETY Basic Concepts: Responsibility, Accountability, and Liability Ethical Analysis Candidate Ethical Principles Professional Codes of Conduct Some Real-World Ethical Dilemmas THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Information Rights: Privacy and Freedom in the Internet Age Property Rights: Intellectual Property Accountability, Liability, and Control System Quality: Data Quality and System Errors Quality of Life: Equity, Access, and Boundaries HANDS-ON MIS Developing a Web Site Privacy Policy: Dirt Bikes USA Achieving Operational Excellence: Creating a Simple Web Site Using Web Page Development Tools Improving Decision Making: Using Internet Newsgroups for Online Market Research 4.2 4.3 4.4 Interactive Sessions: Data for Sale The Internet: Friend or Foe to Children? LEARNING TRACK MODULE Developing a Corporate Code of Ethics for Information Systems DOES LOCATION TRACKING THREATEN PRIVACY? F or many years, parents of District of Columbia public school children complained about...

Words: 20079 - Pages: 81

Premium Essay

Unesco

...Legal and Regulatory Ecology Shaping the Internet     by       William H. Dutton   Anna Dopatka   Michael Hills   Ginette Law   and   Victoria Nash       Oxford Internet Institute   University of Oxford   1 St Giles Oxford OX1 3JS   United Kingdom                                     19 August 2010         A report prepared for UNESCO’s Division for Freedom of Expression, Democracy and Peace. The opinions expressed in this report are those of the authors and do not necessarily reflect the views of UNESCO or its Division for Freedom of Expression, Democracy and Peace.   Preface As stated in its Constitution, UNESCO is dedicated to “Promoting the free flow of ideas by word and image”. Part of this mission, therefore, is to promote freedom of expression and freedom of the press through sensitization and monitoring activities, as a central element in building strong democracies, contributing to good governance, promoting civic participation and the rule of law, and encouraging human development and security. Media independence and pluralism are fostered by the Organization, providing advisory services on media legislation and sensitizing governments and parliamentarians, as well as civil society and relevant professional associations. However, UNESCO recognizes that the principle of freedom of expression must apply not only to traditional media, but also to the Internet. Providing an unprecedented volume of resources...

Words: 39228 - Pages: 157

Premium Essay

Mcluhan Tetrad

...Watching the Watchers and McLuhan’s Tetrad: The Limits of Cop-Watching in the Internet Age   Brian P. Schaefer Kevin F. Steinmetz University of Louisville, US. brian.schaefer@louisville.edu Kansas State University, US. criminogenic@outlook.com Abstract The internet is considered by many to be a boon for political activists, such as cop-watchers—a free, open, and widespread medium in which to disseminate political messages. While there is truth to these claims, the internet, like any technology, can be used for many purposes and comes with its own arrangement of limitations. To elucidate these limitations and to provide a word of caution about the political potential of the internet, particularly for video-activists/cop-watchers, the theoretical work of Marshall McLuhan is used to understand how the internet, as a medium, shapes and limits political messages. Using McLuhan’s tetrad, this study examines how the internet is problematic for cop-watching groups. In particular, the internet is said to yield consequences through how it (1) enhances or intensifies how the viewer experiences political messages through speed, (2) retrieves the importance of the narrator, (3) renders previous media increasingly obsolete, yet opens up new avenues for commercial dominance, and (4) creates additional reversals or other problems for video activism, such as the mass proliferation of surveillance and formatting discussion in counter-productive ways. Introduction Take...

Words: 9922 - Pages: 40

Free Essay

Computer Crime

...of Substantive Computer Crime Law 1. computer misuse crimes = intentional interference w/proper functioning of computers (hackers, viruses) 2. traditional crimes = traditional criminal offenses facilitated by computers (gambling, pornography) B. Computer Crime v. Traditional 1. computer crime usually threatens economic interests more than physical 2. computer crime much more likely to cross state boundaries; most traditional crime is dealt with by the states II. COMPUTER MISUSE CRIMES A. 2 ways they can occur 1. user exceeds his own privileges a. “insider”: has some privileges/rights 2. user denies privileges to others b. may be an “outsider”: no access rights B. Most Common Statutes 1. unauthorized access statutes 2. computer fraud statutes 3. computer damage statutes C. Why Punish? 1. utilitarian: deterrence of harmful conduct, incapacitation, rehabilitation (looks forward) 2. retribution: just deserts; restore moral order (looks back) D. The Hacker Ethic: an open and free approach to using and exploring computers; any computer user has the right to tinker with and improve any computer; rules governing access should NOT be followed 1. misuse can improve security E. How or When to Punish 1. Property-based view: the computer is not yours, so if you break in you should be punished; if you want access, you need permission 2. Harm-based view:...

Words: 16552 - Pages: 67

Premium Essay

Media and Communication in Nigeria

...REFERENCE LINKS TO RESOURCES INTRODUCTION/ OVERVIEW The large and diverse media and communications industry assumes a central role within most economies. The industry covers a range of occupations and media, including: radio, television and film; print media; internet content development; advertising; public relations; speech writing; and design. The industry is highly concentrated and production is dominated by a small amount of large firms that are able to shape the industry’s direction and price levels The media and communications industry encompasses a wide variety of establishments. The media segment includes motion picture/video producers who create movies, television shows, and other videos to sell to broadcasters; publishers who produce and distribute items such as books, newspapers, magazines, and CDs, excluding software; and television and radio broadcasters. Telecommunications is another segment of the industry. It includes both equipment from cables to telephones to services such as wireless carriers or cable providers. Telecommunications is what makes voice, data, and video communication possible, resulting in the information age. A new, quickly rising segment is the use of the internet for new media. New media includes online social networking, shopping, video, and gaming sites; as well as mobile media that can be accessed on some newer, electronic products. History: Different parts of the industry were born at different times. In 1876, Alexander Graham...

Words: 4987 - Pages: 20

Premium Essay

E-Commerce Understanding

...13 information asymmetry, p. 14 marketplace, p. 16 ubiquity, p. 16 marketspace, p. 16 reach, p. 16 universal standards, p.16 richness, p. 17 interactivity, p. 17 information density, p. 17 personalization, p. 18 customization, p. 18 Web 2.0, p. 19 business-to-consumer (B2C) e-commerce, p. 22 business-to-business (B2B) e-commerce, p. 22 consumer-to-consumer (C2C) e-commerce, p. 22 social e-commerce, p. 22 mobile e-commerce (m-commerce), p. 23 local e-commerce, p. 23 Internet, p. 23 World Wide Web (the Web), p. 24 disintermediation, p. 32 friction-free commerce, p. 33 first mover, p. 33 network effect, p. 33 Copyright © 2013 Pearson Education, Inc. 2 Brief Chapter Outline Opening Case: Pinterest: A Picture Is Worth a Thousand Words 1.1 E-commerce: The Revolution Is Just Beginning The First Thirty Seconds What Is E-commerce? The Difference between E-commerce and E-business Why Study E-commerce? Eight Unique Features of E-commerce Technology Web 2.0: Play My Version Types of E-commerce Growth of the Internet and the Web Origins and Growth of E-commerce Insight on Technology: Spider Webs, Bow Ties, Scale-Free Networks, and the Deep Web Technology and E-commerce...

Words: 6285 - Pages: 26

Free Essay

Code

...6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate Chapter 8. The Limits in Open Code PART III: LATENT AMBIGUITIES 83 120 138 Chapter 9. Translation Chapter 10. Intellectual Property Chapter 11. Privacy Chapter 12. Free Speech Chapter 13. Interlude PART IV: COMPETING SOVEREIGNS 157 169 200 233 276 Chapter 14. Sovereignty Chapter 15. Competition Among Sovereigns 281 294 PART V: RESPONSES Chapter 16. The Problems We...

Words: 190498 - Pages: 762

Premium Essay

Government

...Houston Community College Homework 1-5 Presented To: Lloyd W. Gaddis By Yushana Ford Government 2305 8:00A.M- 9:30A.M Mon/Wed 09/20/2015 Chapter 1: The More Things Change…The More They Stay the Same 1. Analyze current problems and issues in American Government by applying Historical perspectives: -History Repeats Itself +A new Communication medium paves the way to Electoral Victory- Meaning the internet and social media have revolutionized American politics. Campaign advertising is the use of an advertising campaign through the media to influence political debate and ultimately voters. Political advertising has changed drastically over the last several decades. Harry S. Truman was proud of his accomplishment of shaking approximately 500,000 hands but his accomplishment was soon pale compared to the next presidential election with the advent of television, war hero and presidential candidate D.W Eisenhower created commercials to get votes and so on and it different with different elections and different decades. +The Power of Incumbency- It is usually used in reference to elections where races can often be defined as being between an incumbent and non-incumbents. Incumbents have easier access to campaign finance and government resources that can be indirectly used to boost a campaign. Incumbency is any elected official who is already in office and seeking re-election. 2. Explain the Philosophical underpinnings of American Political System through...

Words: 10611 - Pages: 43

Premium Essay

Ethics

...Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706. For permission to use material from this text or product, submit all requests online at cengage.com/permissions Further permissions questions...

Words: 204343 - Pages: 818

Premium Essay

Information Technology

...systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security incidents to the U.S. Homeland Security Department during fiscal year 2008, triple the number from two years earlier. The National Aeronautics and Space Administration (NASA) (www.nasa.gov) is one of the hardest-hit agencies. The government agency responsible for the nation’s public space program, NASA, has been the...

Words: 25389 - Pages: 102

Free Essay

Google China Case

...Searching for Internet Freedom in China_GALLEYED (Do Not Delete) 3/18/2013 9:19 PM SEARCHING FOR INTERNET FREEDOM IN CHINA: A CASE STUDY ON GOOGLE’S CHINA EXPERIENCE JYH-AN LEE,* CHING-YI LIU,** AND WEIPING LI*** ABSTRACT ........................................................................................ 406 INTRODUCTION ................................................................................. 406 I. THE NATURE OF THE INTERNET AND GOOGLE’S BUSINESS ............ 408 A. The Evolving Nature of the Internet................................. 408 B. The Study of Google and its China Experience................ 409 II. GOOGLE.CN AND CHINA’S INTERNET POLICY ............................... 412 A. The Story of Google.cn .................................................... 413 B. China’s Internet Policy in the Case of Google.cn............. 419 1. Technological Control of Search Engines .................. 419 2. Legal Control of Search Engines................................ 421 III. POLICY IMPLICATIONS FROM THE CASE OF GOOGLE.CN .............. 423 A. Global Network, Local Internet........................................ 424 B. Leveraging Commercial Power to Regulate the Internet . 426 IV. THE ACCOUNTABILITY CRISIS IN INTERNET GOVERNANCE ......... 428 A. The Problem of Internet Accountability ........................... 428 B. Solutions to the Digital-Accountability Problem ............. 431 CONCLUSION.......................................................................

Words: 13967 - Pages: 56

Premium Essay

Challenges to Criminal Law Makers

...Chik* Introduction Computer and Internet usage is on the rise due to lower costs of computer ownership and connectivity as well as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries can and do cover computer-related crimes or electronically perpetrated crimes. Offences against the computer are relatively new as they arise from and in relation to the digital age, which threatens the functionality of the computer...

Words: 24175 - Pages: 97