StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Government Surveillance and Data Mining Operations - Essay Example

Cite this document
Summary
This essay "Government Surveillance and Data Mining Operations " discusses government that plays a crucial role in protecting the citizenry against future attacks, I believe that their recent actions defile the basic rights of a person…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Government Surveillance and Data Mining Operations
Read Text Preview

Extract of sample "Government Surveillance and Data Mining Operations"

The program is backed up by President Bush as a response to the September 11 attacks.

The NSA has acquired access to and analyzed huge volumes of Internet and telephone communications routed internationally and within the United States. With the cooperation of telecommunication networks, they have gained access to call records of most of the citizenry. Though sanctioned by the Bush administration, the constitutionality of these acts is being questioned. Another issue is whether wiretapping and data mining are acceptable ways of investigating terrorist threats. The President addressed the controversy in a radio address from the Roosevelt Room by saying that he has the authority to approve wiretapping and surveillance programs and that such activities are being done to protect the Americans' civil liberties.

He also claimed that it is a necessary means to prevent terrorist attacks from happening. Bush also condemned the actions of press and media outfits who have exposed the supposedly top-secret program. However, many legal analysts find Bush's arguments unconvincing. The Jurist columnist William Banks in his article, "NSA Eavesdropping and the Fourth Amendment" argues that NSA's domestic surveillance program impinges on the people's rights, especially that of the Fourth Amendment, which guards against unreasonable searches and seizures.

His conjecture is that individuals have reasonable expectations of their privacy, so they are therefore entitled to it. Banks believes that warrantless surveillance is not only unconstitutional, but it also lays the groundwork for abuse. James X. Dempsey, the Executive Director for Center for Democracy & Technology, in his piece "Anti-Terrorism Investigations and the Fourth Amendment After September 11: Where and When Can the Government Go to Prevent Terrorist Attacks", provides a middle ground when he argues that while it is necessary that the government be given strong legal authorities to prevent terrorism, such as surveillance and data mining, limits should be imposed and that guidelines should be enacted to protect individual rights.

The potential for abuse is a pressing issue. The executive power largely goes unchecked by the congress and justice system, and a power that goes unchecked poses the risk of misuse and abuse, as is shown by history. The article, "In this data-mining society, privacy advocates shudder" by the Associated Press, contains a brief discussion of privacy rights and how the program can be used for purposes other than tracking terrorists. It also explains how this kind of government surveillance does not really do anything to increase, security, but instead, lull the masses into a "false sense of security.

" I agree, and spending billions of dollars and resources just to put on a show of strength and safety is questionable. Where the program is being undertaken in a clandestine, shadow environment, protected by the government from all legal accountability, there is nothing to stop the system from being used in other ways, such as to monitoring media outfits and government opposition. This is not to say that the government is already using it for malicious causes, but there is reasonable doubt on the possibility that they will not misuse them.

Moreover, the effectiveness of this kind of method is suspect. While I agree that the government plays a crucial role in protecting the citizenry against future attacks, I believe that their recent actions defile the basic rights of a person. There is a fine line separating government accountability and our basic freedoms and when that line is crossed, the foundation by which our society is built upon crumbles. I believe that the government has no right to dig into other people's business unless they have a reason to suspect them.

As Benjamin Franklin said, "Any society that would give up a little liberty to gain a little security will deserve neither and lose both."

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Do government surveillance and data mining operations do more good in Essay”, n.d.)
Do government surveillance and data mining operations do more good in Essay. Retrieved from https://studentshare.org/miscellaneous/1512282-do-government-surveillance-and-data-mining-operations-do-more-good-in-protecting-against-terrorism-than-they-do-harm-in-violating-privacy
(Do Government Surveillance and Data Mining Operations Do More Good in Essay)
Do Government Surveillance and Data Mining Operations Do More Good in Essay. https://studentshare.org/miscellaneous/1512282-do-government-surveillance-and-data-mining-operations-do-more-good-in-protecting-against-terrorism-than-they-do-harm-in-violating-privacy.
“Do Government Surveillance and Data Mining Operations Do More Good in Essay”, n.d. https://studentshare.org/miscellaneous/1512282-do-government-surveillance-and-data-mining-operations-do-more-good-in-protecting-against-terrorism-than-they-do-harm-in-violating-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Government Surveillance and Data Mining Operations

Argumentative Research Paper

As a measure to retaliate and prevent terror attacks, America and its allies have initiated several counter-terror operations in perceived geo-political hotspots.... To complement these efforts, the scale and scope of counter-intelligence operations are also upped.... 1) While counter-terrorism and counter-intelligence operations might have legitimate causes in certain exceptional cases, today it has come to represent hegemony and power.... The Gestapo, the NKVD, the KGB, the Stasi, and the Chinese Politburo all requisitioned private data such as medical, banking, and library records; now, with the Internet, Chinese authorities track citizens' computer use....
5 Pages (1250 words) Research Paper

Constitutionality of RFID Technology within the Las Vegas Gaming Surveillance System

Radio Frequency Identification (RFID) represents an automatic identification method that relies on storing and remotely retrieving data using RFID tag devices or transponders.... The RFID tag is a small object that can be incorporated into a product and contain antennas to allow....
35 Pages (8750 words) Essay

Why Defending Online Privacy in Digital Age Is So Important

data mining as the NSA is doing is a threat to American companies and the internet by extension (Herman 23).... Conclusion In the research paper, I hope to demonstrate that illegal data mining as done by the NSA and other data miners is undermine the Internet and could cause its collapse.... The gains from data mining are insignificant compared to the loss of trust and openness that make the Internet vibrant (Schneier 56).... Therefore, considering the importance of sharing private information online in maintaining a vibrant Internet, there is need to defend people's privacy and data that is online from government intrusion; this essay will, through presenting evidence from books and other sources, proof that violation of online privacy is a danger to technology companies, the internet, and peoples civil rights....
2 Pages (500 words) Research Proposal

Importance of Defending Online Privacy in Digital Age

The essay "Importance of Defending Online Privacy in Digital Age" focuses on the critical analysis of whether illegal data mining is a threat to the Internet and American technology companies.... ccording to data from American data companies, National Security Agency's Internet surveillance, and illegal data mining is hurting international sales of American Internet companies and hurting online freedom.... Illegal mining violates people's privacy and also undermines the trust people around the world have in American technology companies....
10 Pages (2500 words) Essay

National Security Agency

This, however, has to be approved by the Foreign Intelligence surveillance Court (FISA Court).... The USA Patriot Act's section 215 gives permission to the government to access specific business records for use in national security investigations.... rveillance Act under section 402 allows the government to install and make use of a trap or pen register and trace device for investigations on national security....
9 Pages (2250 words) Research Paper

Where Old and New Media Collide

However, collective intelligence and data mining differ in terms of participation, for in the former active involvement is imperative whereas in the latter it is not.... o what are the similarities and differences between collective intelligence and data mining?... This assignment "Where Old and New Media Collide" discusses data mining that can be used to violate privacy whereas collective intelligence can be exercised to express opinions in democratic ways....
10 Pages (2500 words) Assignment

Technical Specifics of AI in the Real World

Honavar and Uhr (1994) point out that this involves interpretation, manipulation and integration of data from sensors with the systems internal operations setting the context and purpose of action.... This understanding is usually based on data collected for the environment.... For example, perception of data.... AI is able to relay its interpretation of received data and explain events and actions to other intelligent agents like humans....
10 Pages (2500 words) Coursework

Knowledge Worker and Knowledge Society, Types of Information Systems, Data Warehouses, and Data Marts

The paper 'Knowledge Worker and Knowledge Society, Types of Information Systems, Data Warehouses, and data Marts' is a meaningful example of information technology coursework.... The paper 'Knowledge Worker and Knowledge Society, Types of Information Systems, Data Warehouses, and data Marts' is a meaningful example of information technology coursework.... The paper 'Knowledge Worker and Knowledge Society, Types of Information Systems, Data Warehouses, and data Marts' is a meaningful example of information technology coursework....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us