Privacy or Safety: Issues of Government Surveillance

Have you ever been told about the government and how they listen and watch everything you do? Ever been told on how it’s for your good’ or ‘it prevents crime’? It’s obvious that those people believe that government surveillance is effective and reduces theft, however, research shows that government surveillance does more harm than good.

One reason why the government should not survey its citizens is that the government is untrustworthy. In an article called “Our Sneaky Surveillance State” by Cyrus Farivar, an investigative tech reporter at NBC News, he states in September of 2012, “The San Leandro City Council first discovered that its own Police Department had license plate readers- five years after they’ve been deployed.” This sparks a lot of questions. Who enlightened them? Who exactly installed them? Why were they never informed? What else are they hiding? This is far from the first time the government has invaded citizen’s privacy without court approval. Because back in 1952, Harry S. Truman founded the Nation Security Agency. NSA, the same USA agency that can listen to phone calls and collect American’s internet activity without approval. Recently, the United States filed a lawsuit against Edward Snowden, a former employee of the Central Intelligence Agency (CIA), and contractor for the National Security Agency (NSA), who published a book entitled Permanent Record in violation of the non-disclosure agreements he signed with both CIA and NSA. “This matter is being handled by the Department of Justice’s Civil Division and the U.S Attorney’s Office for the Eastern District of Virginia.” (The United States Departments of Justice) This shows that some people are ignorant, even people who work for something like the NSA. It would be at high-risk if a job similar to this fell into the wrong hands. And you can’t exclude that in an article called ‘The Case for Internet Surveillance’ by Daniel J. Gallington, a senior policy and program advisor states that much of the gear that acquires cities and countries come from federal grants, and often well-intentioned police chiefs and other officials come before city councils or county supervisors with some neutral requests to approve a chunk of money in the name of fighting terrorism. But the lawmakers have little to no idea what exactly they’re approving and don’t ask how the gear will be put to use. This is super suspicious considering that that gear is a big deal and they should be more cautious. Most people are coming to the conclusion that they’re hiding something once again since they won’t even inform the lawmakers.

Another reason why the government should not survey its citizens is that surveillance does more bad than good. Government surveillance sweeps gather more bystanders than subjects. In an analysis of the information gathered through FISA 702, “The number of non targeted communications are 10 times greater than the data that the government actually wants to analyze from a suspect.” (National Security) To add, individuals can be charged without any knowledge of their participation. This disadvantage comes to us courtesy of the Upstream program from the NSA. The government scans the information that flows over the interest to see if there is information that flows over the internet to see if there is information about foreign intelligence targets. If you speak of a political figure to a friend who lives overseas, then that could be enough to trigger a review of your conversation.

My last piece of evidence to support my argument is that the government places innocent people under investigation. Even if the data collected through government surveillance creates a reasonable suspicion of conduct for the targeted person, there may not be a guarantee that the individual is guilty. When we increase the amount of coverage that’s in society, then we begin to restrict the rights of those who don’t deserve security interventions.

Some argue to say that surveillance helps solve crimes and utilizing surveillance gives us a boost for catching criminals, but, if you read articles about criminals before they committed the crime, anyone could connect the dots in hindsight. When we take a look back at the various acts of violence that were captured through surveillance, it is noticed that many of the perpetrators tend to appear on watch lists because of the sheer amount of data collected. When Boston bomber Tamerlan Tsarnaev was placed on a terrorist watch list before attacking the city during the marathon, it was much easier to see the behavioral patterns and actions that led to the event after the fact than it was to predict what his actions would be. This issue creates a problem for government surveillance. You can always see clearly in retrospect. That means we tend to learn more when we start to connect the dots instead of trying to prevent problems in real-time.

In some cases, government surveillance’s use is authorized to keep people safe and the technology could help save lives. However, the difficulty with this issue is that governments tend to collect and keep information so that it becomes helpful in a variety of ways. Instead of keeping people safe, the data transitions to keeping specific people in power. Which is a selfish selfish decision. In conclusion, this is why the government should not survey its citizens.

The Dangers of Government Surveillance on Internet Users and Possible Solution: Analytical Essay

Have you ever had the feeling of been watched and monitored by someone hiding in the shadow? Watching every single move of yours, what you do, where you go, who you interact with, and all of your daily activities. If you are certain about this, then your guess is correct because every single one of us is under our governments watch. Our government has encroached into the privacy of every single citizen without our consent. They carry out this act with unimaginable ease using our own gadgets, the gadgets we all carry along with us and use for our daily activities. It might interest you to know that some of us are practically addicted to these devices without knowing the greater harm they pose to us. Some of these gadgets and devices include amongst others handsets, iphones, laptops and a whole lot of others. This act of monitoring us could also be carried out using applications on the above mentioned devices as long as the posses a camera and a headset/speaker/ mouth piece. The government monitors every message, calls, emails, chats and every other thing that are done on our devices and computers.

The act of surveillance came into existence as a monitoring strategy applied to trace and track different kinds of activities in numerous places. Government uses it as a security mechanism anytime there is a need to gather multiple information and to maintain balance. In other words, Government uses it as a technique to curb crimes, to carry out scrutinies, and also for extensive economic development.

Government agencies like the FBI, NSA, and CIA keep a very tight surveillance on some categories of citizens to monitor everything about them. This to some extent may be due to security reasons but this doesn’t give them the right to encroach into people’s privacy without their consent. Private life is no longer private.

It is an essential tool used by the government to develop and establish a database that serves as a data bank. The Government uses this information as a reference, economic predictions, various analyses, and also to determine new policies worthy of being implemented. The Government considers surveillance useful because it assists them in controlling political opposition and restricting vulnerability on the welfare of citizens.

Government surveillance is of various types and patterns. Surveillance could be viewed from citizen’s gadgets as earlier discussed. All of these are helpful in investigation and to also vindicate citizen.

There’s no difference between cyber hackers and government surveillance since they both invade people’s privacy without them being aware of it. Every single financial transaction, message, call, that is carried out on mobiles devices and computers that possess our addresses, bank details and other vital information are not secrets to the government.

Gоvеrnmеnts viоlаtеs privасу tо supprеss minоritiеs and also use еxtrеmе rulеs аnd tоrturе tо mаintаin соntrоl оf thеir сitizеns. Tаking thе prеsеnt gоvеrnаnсе in сhinа аs саsе studу;

Thе Сhinеsе gоvеrnmеnt is so nоtоriоus that it limits whаt wеbsitеs its citizens саn ассеss thrоugh thе usе оf whаt hаs соmе tо bе knоwn аs thе Grеаt Firеwаll оf Сhinа. Thе Grеаt Firеwаll blосks а lаrgе numbеr оf fоrеign wеbsitеs, inсluding еvеrуdау social media plаtfоrms likе Tеlеgrаm, Fасеbооk, Twittеr, аnd УоuTubе. Сhinа аlsо rоutinеlу blосks аnу соntеnt thаt соntrаdiсts thе stаnсе оf its соmmunist gоvеrnmеnt.

According to the New York Times, it was stated that citizens are no longer safe with their data due to the extension of the law that authorizes warrantless surveillance program in the year 2018. With this, any government agencies like the FBI have access to spy into your personal device and check through your messages, emails, chats, calls, videos, pictures and everything on your devices without your consent and knowledge. As a result, no one can say they are free and safe.

Surveillance by Government is a growing issue that has attracted lots of queries from citizens about their freedom. Too much monitoring makes people feel very much uncomfortable and unsafe in their daily activities, knowing fully well that Government is keeping tabs on them continuously. Most times, citizens dont feel too comfortable sending out specific sensitive messages. They feel so insecure as Government keeps their surveillance lamp on them.

However, it is indeed the primary reason for the birth of blockchain technology that is set to provide individuals the capacity to make untrackable financial transactions. However, many blockchain platforms provide protected and decentralized texting or messaging, but Stegos promises to offer more than usual. It gives users the ability to securely and privately disseminate messages without leaving traces about the receiver or the sender.

The issue of privacy created a platform for the introduction of stegos, which is entirely a private cryptocurrency and messaging platform designed to protect users from government surveillance. If anyone feels insecure about the watchdog of the Government, this is the perfect platform that provides guaranteed maximum protection required.

The Stegos Privacy Platform (Stegos) combines a unique blockchain and token design to implement the first cryptocurrency that’s completely private, secure, efficient, and environmentally sustainable. Stegos is fully scalable and prunable, ensuring the chain always remains compact without compromising trust. This makes Stegos the world’s first public blockchain to offer secure and confidential data storage and transmission in addition to payment transactions.

Privacy is indeed a global issue that requires urgent attention that Stegos privacy takes seriously. It would be nice if the Government can create workable strategies that will be effective enough to safeguard the private data of citizens and companies rather than having them exposed to spies and hackers.

Government Surveillance: Pros and Cons

Government Surveillance refers to how the government accesses domestic communications. It can also refer to as how the government access communications involving potential foreign influence and terrorism. The aims of government surveillance are intelligence gathering, prevention of crime, the protection of a process, person, group, or object, and the investigation of crime. It is also used by criminal organizations for negative intentions.

The pros of government surveillance include:

  1. Collection of information: The primary advantage of government surveillance is to gather enough information. Government agencies can obtain the information by direct investigation with subjects, infiltrating opposite groups, or using adequate and sophisticated intelligent resources to monitor communications.
  2. Absence of Threats To Physical Attack: During the process of government surveillance by any means; either over the video, internet, or communication lines, there is no level of risk of physical harm or attack posed to the objects being investigated. That makes it a win-win for the governments and object
  3. Real-time: The advent of government surveillance has brought about an easier way to determine the reason for an action and the level of justice that is necessary for any circumstance.
  4. Global Scale: There is a wide availability of government surveillance and it is almost everywhere. Tiny and sophisticated cameras with a high degree of audio and video quality can be installed on poles, stop lights and in the You can find cameras installed on telephone poles, stop lights, and in the ceilings and exterior of homes and businesses around the world. There are automated license plate readers that can be installed almost anywhere to track driving patterns in the city. Drones can provide real-time surveillance as well. Then you have the secret programs of the government that can record and analyze data automatically on a mass scale.

The cons of government surveillance include:

  1. Imprecision: Nothing is actually perfect. When surveillance is conducted by the government on a mass scale, then it is not possible for the monitors to pay close details to everything that happens in society. Even when there are automated systems that can notify the authorities of irregular behavior, conversation keywords, or specific subjects who could be problematic, the number of false positives in the system is always going to be greater than the real problems you’re trying to catch. The world is full of a variety of conversations that makes monitoring all of them an imprecise effort at best.
  2. Attention Drifted Towards Innocent Ones: Even if the data gathered through surveillance creates a conclusive suspicion of conduct for the targeted person, there may not be a guarantee that the individual is guilty. When we increase the amount of coverage that’s available in society, then we begin to restrict the rights of those who don’t deserve security interventions. We have already seen innocent people being placed on watch lists, having their lives placed underneath the microscope of an investigation, and it occurs with ever-fewer pieces of evidence that back up the scope of what is happening.

In conclusion, these government surveillance pros and cons go beyond the idea that such an action would provide justice for all at the cost of having zero privacy.

Government Surveillance in the United States: Analytical Essay

This text seeks to analyze how citizens’ voices are being suppressed through government surveillance with a focus in times of national crisis where inhabitants are asked to exchange privacy and liberty for security and protection. Some supporters of heightened government surveillance ratify the actions as believed to be obligatory for national protection, on the other hand, those against it argue the importance of privacy rights serving as a shield for individuals from the scrutinizing eyes and ears of neighbors, huge corporations, and the state itself.

The growth in concern regarding this issue started in 2013 when Snowden revelations were released which was identified to be an unprecedented breach of United States classified intelligence. (Greenwald) Not only did it alarm the citizens of the United States but it also caused an international repercussions when Snowden decided to resign from his position and divulge many classified documents he had access to when he was still part of the National Security Agency (NSA) in order to reveal the ways of the intelligence community in conducting its tasks. The extent to which the United States government had been employing technological resources such as global positioning systems, biometric technologies, data surveillance, along with video monitors and airport body scanners to conduct surveillance remains an issue of intense debate.

Growth of US Surveillance

On September 11th, 2001 marks the unprecedented augmentation and historical turning point of national security efforts within and outside the United States when both the Pentagon and New York were targeted by a terrorist attack. With the huge support of the citizens in order to preserve the safety and protection of Americans, the nation took rapid action in which was called by President George W. Bush “War on Terror.”

After the terrifying attack, the US invasion of Afghanistan on October 7, 2001, develop into America’s longest-standing protracted conflict in history. As a result legislative measures were quickly taken, with the legitimate intention to protect and prevent the nation from possible similar 9/11 attacks. The most supreme of these measures was the “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act,” or commonly known as the USA PATRIOT Act, which made changes to US law, including laws pertaining to mass surveillance conducted both domestically and abroad, banking, immigration, and diplomatic espionage (Bamford,Boghosian, MacAskill,Peissl,Smith & Hung). “The USA PATRIOT Act greatly expanded the US government’s authority to use surveillance domestically and internationally and removed many of the previous restrictions that had been set into place, for the protection of personal privacy” (Peissl, Smith & Hung). The Act also allowed the use of eight electronic mass surveillance and the storage of personal data on American people while diminishing the checks and balances of public accountability and judicial oversight (Boghosian, Byman & Wittes, Etzioni, Greenwald, Peissl, Smith & Hung).This level of infringement on private lives was an important departure from what had gone on before.

US Surveillance background

As far back as the country’s conception, legislatives acts and measures on US surveillance were already prevalent, however it took a huge turn during the 20th century as communication advancements were rising whilst onset of World War I and II. During World War I, with the heightened utilization of radio technology for military operations, the US 5 decided to create Cipher Bureau, to help with cryptology and radio intelligence and or the study of codes and how to crack them. Although theCipher bureau was immobilized in 1929, it was reconstructed as the core of the Signal Security Agency in World War II (McNiff). The first law to address wiretapping was the Federal Communications Act of 1934 and established the Federal Communications Commission (FCC) which states that wiretapping was not illegal, however the “information that was gathered was protected under a nondisclosure agreement” (FCC).

Pro-Surveillance supporters

Some of the most distinguished advocates of surveillance included the following: Republican Speaker of the House John Boehner; the Bush administration; former Secretary of Defense Robert M. Gates, attorney Gerald Walpin, journalist and senior producer at CNBC Mathew J. Belvedere. What all of these notable people and others have in common is that they link their position of support for surveillance to the war on terror which was a term coined by President George Bush.

During and after the 9/11 era, supporters of government surveillance pushed the argument that government surveillance is not only necessary for the protection of the people and is constitutional, but also mandatory for the US intelligence community to install the most advanced and up to date technologies to monitor electronic communications domestically and internationally. (Allen, Blankley, Inkster, Lomas, Toxen,Walpin). In addition, pro-surveillance group states that for government surveillance to be effective and efficient, especially when it comes to averting terrorist attack, it should not be restrained (Blankley, Lomas, Walpin,).

Anti-Surveillance advocates

Huge critics of the government surveillance include authors such as: author and former journalist for The Guardian, Glenn Greenwald; former Foreign Intelligence Surveillance Court (FISA) Judge John D. Bates; journalist for the New Yorker John Cassidy; former intelligence analyst Edward Snowden, among others.

Those who oppose government surveillance argues that surveillance by the US government in particular has turned extreme to the point of almost becoming a threat to democracy and the rights of American citizens (Boghosian, Cassidy, Frontline, Gellman & Poitras, Greenwald). Based on their view, state surveillance is a violation and abuse of governmental power against the American constitution of “government of the people, by the people, and for the people.”

Conclusion

Despite the many voices from political leaders and American citizens to urge a balance between privacy and surveillance, it is still strongly suggested that the relationship between the ones concerned for human rights and the ones worried with security appears to be a polarized one.

In order to create a balance, forcing a new kind of accountability such as the current rise of WikiLeaks would be the best option. Information sites like this seems to provide a large possibility that enclosed information to the public will now be shared openly to keep democracy in check.

Solving Global Government Surveillance Challenges: Analytical Essay

Solving Global Government Surveillance Challenges and How Stegos Can Change the Status Quo

Have you ever had the feeling that you are been watched by someone, someone hiding in the shadow, watching your every move day in day out, watching everything you do and wherever you go? If you are certain about this, your hunch is probably correct because everyone of us is been watched by the government. This so called government have encroached into every citizens privacy. They do not need to put anyone on anybody’s trail, they simply do their watching through the use of electronic devices. The government monitors every messages, calls, emails, chats and every other things that are done on mobile devices and computers. Government agencies like the FBI, NSA, and CIA keep a very tight surveillance on some categories of citizens to monitor everything about them. This to some extent may be due to security reasons but this doesn’t give them the right to encroach on people’s privacy without their consent. Private life is no longer private.

There’s no difference between cyber hackers and government surveillance since they both invade people’s privacy without them being aware of it. Every financial transactions, messages, calls, that are Carrie out on mobiles devices and computers that Carrie our addresses, bank details and other vital information are all known by the government.

According to the issue as published in the New York Times, it was stated that citizens are no longer safe with their data due to the extension of the law that authorizes warrantless surveillance program in the year 2018. With this, any government agencies have access to spy into your personal device and check through your messages, emails, chats, calls, videos, pictures and everything on your devices without your consent and knowledge. Thus, can anyone say they are free and safe?

For this serious issue that people are facing due to government surveillance, there’s the urgent need for a way that people can send messages, make transactions, and feel safe with their personal data without government access to them. As a matter of fact, Stegos is the saving grace forthis government surveillance. Stegos is a scalable, ecologically friendly, optimally and private cryptocurrency. It focuses on privacy issue and ensures that every transactions carried out are privately secured. Stegos is designed to address the rapid growth and lack of privacy that government surveillance is constituting.

Interestingly, every transactions carried out under Stegos are not traceable, linkable, retrievable, and transaction history is impossible to generate. Stegos uses Snowball privacy which makes it impossible to generate any transaction history plus, transactions are carried out in bulk and are been sent through a stealth address instead of the recipients address.

How will Blockchain Technology address this situation?

In spying on any individual, the data of such individual is needed. To protect and secure very individual’s data, extra effort is paramount. And since every data are been centralised, they can be easily manipulated and stolen. This is why decentralization is vital. In every blockchain technology, we can see that decentralization is one of their core value. Any data that has been inputted in the blockchain technology cannot be tampered with plus, no data in blockchain belong to a single entity. The system is basically censorship-resistant.

Additionally, most major social media platforms are embracing blockchain technology privacy and Stegos is one major option here. Steaks uses zero-knowledge proof in its ecosystem which offers greater form of privacy for it users. Stegos allows every users to access their data without having access to those data itself. Users have full ownership of their data. Optimum privacy of your data is guaranteed with Stegos.

The New Dawn of Privacy

Since it is widely known that people are greatly concerned about their data and privacy, it’s important to know how the new form of privacy people are so craving for will play out. With this kind of crypto privacy that Stegos is offering, it will cover the following areas;

  • Trading
  • Messaging and chats
  • Private App
  • Transactions

In the areas of trading, peer-to-peer trading is safeguarded. Users can buy and sell crypto with the use of atomic swap. It’s a must to mention here that Stegos is not concerned with the privacy issues of other cryptocurrency and thus, transacting with other crypto may cause user to face privacy issue from the exchange crypto but the minute the crypto enters into Stegos ecosystem, they are never traceable nor searchable. It’s bound by Stegos privacy features. Exchanging with other crypto provider is quite risky as it requires the provision of vital data that are not so required in a truer sense. But the moment the crypto reaches Stegos ecosystem, privacy is guaranteed. Also, Stegos app offers a more private communication without actually divulging your details. There are lots of chat services that users can initiate which are privately based.

Final Thought

Every individual have the right to their privacy and should be protected from government surveillance. A team has been successful in designing a privacy protocol that will see to the end of government surveillance menace. It’s expected that with this new innovation, many people will get their freedom and be rest assured their data is properly secured and safeguarded.

Solving Global Government Surveillance Challenge: Critical Analysis of Stegos

Government surveillance came into existence as a means to track and monitor activities going on in different places. It’s most times use as a security measure each time the government needs to gather information. It’s also used for checks and balances. In a simple term, government uses surveillance to maintain orderliness, control crimes, check excesses, and to help the economy.

Government as we all know is vested with the power to enforce law and order, protect lives and properties, defend human rights and among others. But then, with the issue of surveillance, can the citizens really believe their freedom and privacy is not been matched upon by the government, since they now keep wandering eyes on every activities of every citizens? Needless to say, private life is no longer private.

The rate at which government surveillance is growing is now regarded as a serious challenge since no one can really know their level of freedom and privacy. Too much surveillance makes people feel less safe and protected. Many people are now being careful as to the kind of messages they send out, the kind of calls they make and so on since the government now watches everything to and fro.

Whether the government likes it or not, her hold on people’s privacy must be broken and a solution must be provided. This is where Stegos is challenging the status quo. Lots of blockchain technology has introduced optimal privacy features in their blockchain. But as it stands now, Stegos is the only blockchain technology that has so far offered a more comfortable and reliable privacy feature that’s absolutely untraceable, undetectable, and unlinkable.

Stegos is a private cryptocurrency and messaging platform that’s designed to protect its users from third party accessibility of their transactions and messages. It provides maximum security and privacy for every user. Due to the unique design of Stegos blockchain and token, makes it the first ever cryptocurrency that’s immune against government surveillance and it’s fully integrated. Every transaction and message sent through Stegos platform cannot be traced, detected and linked. It’s absolutely anonymous. Unlike other public blockchain that’s makes it very simple for the government to see all their transactions, this is not so with Stegos.

The recipient’s address cannot be known because this platform has been designed in such a way that every transactions and messages are sent to the recipient from a different address and thus, it doesn’t discloses the sender’s address nor the recipient’s address.

With Stegos, government surveillance is an issue soon to be forgotten. People can now safely make transactions, send messages, make phone calls without getting worried over any watchdog. Users data are securely protected. Communication between people can no longer be traceable.

Why Stegos?

Actually, Stegos is much more than another private transaction, it’s a unique platform for making payments and sending/receiving messages which is enormously secured, reliable, scalable and environmental friendly than any other blockchain.

Stegos and Privacy Concern

In Stegos, only the sender and the recipient have full access to the transaction details. This transaction details are cloaked with random values while the public addresses are cloaked with stealth addresses. Also, some people are fond of posting their QR code online, be rest assured that even in the midst of this, nothing will be traceable to you.

For communication, Stegos offers private communication between persons. Users can send and receive messages without the disclosure of their personal details to the outside world.

Additionally, Stegos also offers peer-to-peer trading and you are well protected from any kind of surveillance. The only issue here is that Stegos is not liable for the privacy feature of other crypto, but every crypto exchange that enters stegos domain is outrightly protected by Stegos privacy policy.

In conclusion, government surveillance is a menace that is affecting many people. Stegos is very immune against this surveillance. It’s secure, scalable, reliable and ideal for everyone.

Why Government Surveillance Is Bad Essay

Argumentative Essay: Government Surveillance is Ruining the World

Government Surveillance is an atrocious thing happening right now. The government is throwing itself into everyone’s daily life by spying on the people. It starts off with spying on the people with their electronical devices where the government then can gain access to all of your information. While having this surveillance they are breaking what is most important to the people of America: their rights. government surveillance is not just happening in the United States either it is happening in almost every country in the world. Government surveillance is using electronic devices to collect data from people while breaking the people’s privacy and rights and more countries are following this trend of implanting government surveillance.

Stingrays are utilized by law authorization offices to follow individuals’ developments, and capture and record discussions, names, telephone numbers and instant messages from cell phones. Their utilization involves the observing and assortment of information from every single cell phone inside an objective territory. A pinnacle dump is the sharing of recognizing data by a phone tower administrator, which can be utilized to distinguish where a given individual was at a specific time. As cell phone clients move, their gadgets will associate with close by cell towers so as to keep up a solid sign even while the telephone isn’t effectively being used. These towers record recognizing data about cellphones associated with them which at that point can be utilized to follow people. In the greater part of the US, police can get numerous sorts of cellphone information without getting a warrant. Law-implementation records appear, police can utilize introductory information from a pinnacle dump to request another court request for more data, including addresses, charging records and logs of calls, writings and areas. Cellphone spying programming is a kind of cellphone irritating, following, and observing programming that is secretly introduced on cell phones. This product can empower discussions to be heard and recorded from telephones whereupon it is introduced. Cellphone spying programming can be downloaded onto cellphones. Cellphone spying programming empowers the checking or stalking of an objective cellphone from a remote area with a portion of the accompanying procedures. Permitting remote perception of the objective cellphone position progressively on a guide. Remotely empowering receivers to catch and advance discussions. Receivers can be initiated during a call or when the telephone is on reserve for catching discussions close to the cellphone. Getting remote cautions as well as instant messages each time someone dials a number on the cellphone. Remotely perusing instant messages and call logs. Cellphone spying programming can empower mouthpieces on cell phones when telephones are not being utilized, and can be introduced by portable suppliers. Geolocation following on cellphones. GPS on a cell phone is probably the best creation — in the palm of your hand, you can get headings from Indicate A Point B, or let companions know your present area. Yet, that equivalent GPS likewise lets law authorization authorities know where you are. The American Common Freedoms Association has mentioned data from 31 states for insights concerning how law requirement utilizes cellphone area information and how much of the time it is accumulated. The government has likewise conceded that it has the position to follow individuals through mobile phone information. PC and system reconnaissance is the observing of PC action and information put away on a hard drive, or information being moved over PC systems, for example, the Web. The checking is frequently done secretively and might be finished by governments, companies, criminal associations, or people. It might possibly be lawful and could conceivably require approval from a court or other free government organizations. PC and system reconnaissance programs are across the board today and practically all Web traffic can be observed. Government approaches the entirety of your program history. It has made arrangements with Facebook, Google, Mac, and Skype to watch out for individuals and the stuff they do on their PC. The legislature approaches the camera on your workstation which integrates with the arrangement with google couple and skype and some other video talk calling application. It records the call and recognizes the individual on screen. Approaches the entirety of the records situated on the PC and just as any private photographs and any private data on the PC. Additionally, has free increase to any of the individual business records on the PC to assist more their recognizable proof procedure and to perceive what the individual has been doing in their life. While having government surveillance in the people’s electronics is bad enough they also take away the people’s rights to “keep them safe”.

As stated in the constitution the fourth and first amendment are the right to prohibit unreasonable searches and seizures and to the right of freedom of speech. By adding government surveillance into our world, the government is breaking the fourth amendment. The fourth amendment is the right to prohibit unreasonable searches and seizures and so the government has started a program called PRISM to target foreign Americans and to gather their private info and into their private communications hence violating this amendment. This program allows people to be spied on without a warrant. Even when a person is convicted of a crime, they usually never tell them that they were caught doing a crime based on the surveillance the government was watching. The first amendment is the right to the freedom of speech and is broken by government surveillance as well. People in this world use this right usually to peacefully petition our government, but now are scared due to the fact of government surveillance. These people are afraid to speak their minds and are afraid of getting in trouble with the government because they are listening and watching at all times. The government’s main source of watching people is through security cameras. The government has access to any public camera they want whether they be in a train station, a store, or even at the street lights. Although the government has admitted to spying on its citizens and foreigners there is no total amount of people affected by this due to them not giving an estimate amount. Edward Snowden is a former CIA agent and has recently fled the country due to him leaking out to the American public that the government does actually spy on its own people. With the United States using government surveillance and spying on its own people it caught the eye of other countries who are also using mass government surveillance now.

Ever since the United States started using government surveillance more and more countries have started to use this improper way of looking into people and looking into all their information. Russia has started its own way of government surveillance by collecting data through data mining and open source intelligence which is the gain of any information publicly. Russia also uses lawful interception which allows them to wire tap and hear people’s conversations whenever they want to. And lastly, they use the telecommunications data they find through electronical surveillance. SORM is a Russian program that stands for System of Operational Investigatory Measures, and this program has to have telecommunication operators to install the program given by the Federal Security Service. Which it then allows Russia to gather any communications metadata and the content, which includes phone calls, email, and website history. China is the next big named country to start using government surveillance in their own way. China has taken a more traditional approach to it and is just using surveillance to gather info on people who are suspected criminals. When government surveillance was first created in china by a guy named Mao, it was meant to encompassed the nation and the people within the nation and to improve his powers. Now china’s government surveillance is mostly through internet tracking, phone calls/texts, and also just stuff that happens to be seen with a naked eye. Germany is also a big named country that has possessed government surveillance in the recent years. Germany uses a program called Nachrichtendienstliches Informationssystem. This program is a searchable database operated by the German security agency Bundesamt für Verfassungsschutz. This is Germanys main way of collecting information on people and spying on them as well.

Throughout the history of the world multiple terrorist attacks have occurred mostly committed by foreigners. The governments of the countries believe if they incorporate government surveillance it will cut down the number of attacks which it doesn’t. The countries use the surveillance in electronics and even cameras. The main reason they use this surveillance is for spying purposes on their citizens but what the countries don’t realize that it breaks the rights the people have that are in the constitution. Government surveillance is not just happening in the United States either, it is happening throughout the entire world with many different countries.

References

  1. Government Surveillance. “amendments.” Subscript law, www.subscriptlaw.com/government-surveillance
  2. SecruityNewsDaily. “surveillance.” Nbcnews, –http://www.nbcnews.com/id/44329996/ns/technology_and_science-security/t/ways-government-watches-you/#.XdW2gppKjIU
  3. Toomey, Patrick. “The NSA continues to violate Americans’ internet privacy rights.” ACLU, 22 August 2018, https://www.aclu.org/blog/national-security/privacy-and-surveillance/nsa-continues-violate-americans-internet-privacy. Accessed on 21 November 2019.
  4. Szoldra, Paul. “This is everything Edward Snowden revealed in one year of unprecedented top-secret leaks.” Business Insider, 16 September 2016, https://www.businessinsider.com/snowden-leaks-timeline-2016-9. Accessed on 20 November 21 2019.