The main issue in the Snowden controversy is the conflicting rights of private individuals and the US government with regard to the use of telecommunications and the internet. There are ethical issues surrounding this controversy and the most applicable ethical approach for this case is “Ethics by Rights Approach”. As a background, the reason why US government had declared Edward Snowden a traitor is his involvement in the leaking of about 1.7 million confidential US documents, 15,000 Australian intelligence files and 58,000 British intelligence files from the National Security Agency (or NSA) to the public. These confidential information were acquired by the NSA through the PRISM program by collaborating with big internet companies such
This is parallel to the novel 1984, which focused on a totalitarian government where people’s privacy was violated. The privacy violations Americans experience today are similar to the privacy violations occurring in 1984, because the government can spy on us through our phones, Wi-Fi tracking and GPS tracking like the telescreens in 1984. The novel 1984 take places in the city of Oceania, where technology was so advanced that the people were continuously watched, leaving them no privacy. In order to accomplish that, the government used a telescreen to watch them. The slogan the Party used was “BIG BROTHER IS WATCHING YOU” which reminded them that the government was controlling them.
Privacy is the individual or group information and their ability to keep them or reveal partially. Privacy is also about the right to know who collects this information, why the information is being collected, and how it will be used. (Soffer and Cohen, 2015) Privacy is subjective to an individual or group; sometime it is about being anonymous in the public. Since social media have become an integral part of human life and their use has been increased significantly over recent years. With the amount of data being collected and manipulated our privacy is being compromised in different ways.
The government brainwashes their citizens to get them to be unquestioningly loyal to the party. The issue of brainwashing stands out as one of the most important topics in this book as well as one that is very relevant to today. Orwell communicates through his book that brainwashing is pervasive and destructive to our sense of reality and logic as human beings, and that it has a negative impact on the citizens subjected to it. Orwell expresses this belief especially at the end when Winston is in the ministry of love. We get to see the party’s thoughts in full detail as O’Brien explains everything to Winston and simultaneously brainwashes him.
Controversy has been stirred up concerning the monitoring of internet content by the government. Many believe that this action is violating their right inscribed in the fifth amendment which protects against self-incrimination, which in turn protects the privacy of personal information. But with the existence of agencies such as the NSA and Acts like the USA PATRIOT Act, the government has shown that it is more concerned with the national safety over personal privacy. Though this topic is more popular now, these types of security measures being practiced by a country in the name of national security is nothing new. It is certain that when it comes to monitoring and preventing potential criminal endeavors, the government has the authority to supervise cyber activity but, should practice effective security measures that would also show respect to the privacy of the public, thus not discontinuing neither allowing this approach to continue unaltered.
This phenomenon occurs when the United States government announced that there was a steady increase of vulnerabilities resided in applications software that could be exploited in cyber-attacks based on the national database from 1997 to 2006 (Denning and Denning 154). However, as cyber users, we should have concerned and acknowledged the potential threats introduced by cyberspace since we first utilize it. A lot of us who use cyberspace including policymakers and legislators are unfamiliar with cyber security. We do not know why and how to ensure our personal information; we just give out our information whenever we are asked to such as providing credit card security number and filling out true personal information on social media. Moreover, the government and public do not realize the importance of cybersecurity as “the Internet was designed to be open, transparent, and interoperable,” says William Lynn, a former U.S. Deputy Secretary of Defense.
Either way, big data collection is a major concept in the engineering field and relies heavily on the idea of utilitarianism. One instance of big data collection is the collection and monitoring of internet search history by the government. Leaked classified information has indicated that the government has been collection internet search history form major internet companies. Some people believe this practice is ethical due to utilitarianism. Others state that the collection of internet search history is a major invasion of privacy and has no benefit to society.
Introduction The actions undertaken of Edward Snowden, the well-known former NSA fugitive who had leak tons of sensitive information from National Security Agency, NSA since 2013 had left a catastrophic impact towards the citizens across the globe as people had been aware that personal privacy conducted on today’s technology communication channels are not truly encrypted, which it leads to the actions where citizens are “losing confidence and trust upon the local and international government especially NSA”(Schneier, 2013) towards monitoring and intercepting the day-to-day communications that invades the citizen’s privacy space. As today’s world is entering a new state of global hyper-surveillance, personal privacy is a truly subjective area where it almost involved in all kinds of aspect such as criminal and terrorism, social networking, political sciences and others. In addition with the presence of information technology, the engagement between the aspects of personal data protection and privacy in today’s cyber world is getting a serious issue apart from the physical aspects of data privacy because the world is stepping forwards into the world of Web 3.0, which is the web that linking things from users to all sort of connected devices, whereby this eventually might lead to a more serious thought from individuals upon the possibly where personal data and privacy over the cyber world might
While there are many positive consequences, there are negative consequences. To my thinking, as social media sites were being developed, the most apparent of the manifest dysfunctions would have been the loss of privacy or invasion of privacy, your information is out there for all who want to see, at least until privacy controls came into being. The latent dysfunctions keep growing as social media grows. Unintended negative consequences can include the reduction of face to face interactions (Austin, 2013) and voice to voice interactions, using the phone to actually talk to another person. There is a false sense of connection, less meaningful relationships fostered in the real world versus the casual relationships formed through social media(Jung).
Moreover, individuals such as investigators, legislators, regulators and even privacy campaigner have an increased attention towards the privacy issue. For this reason, security issues in the internet have become a threat in the internet. (Loeffler 2012, p12) Furthermore, a loss in privacy can lead to a disastrous effect such as that even a complete stranger to you would be able to know all about you, from your name until your child’s name. ‘Soon, it may not be possible to go online without at least telling your device who you are. The end of anonymity on the web could be fast approaching, raising a host of questions about privacy, security and freedom.’ (Baraniuk 2013, p34-37) Almost all people did not know what will happen without privacy.