preview

Privacy : National Security Vs. The Fourth Amendment

Good Essays

Privacy: National Security vs. The Fourth Amendment
Privacy! It’s an elementary principle we all value and fight to protect. However, with technological trends, such as Facebook, Instagram, Twitter and Snapchat, our lives have now become accessible to all. These social media platforms have become part of our daily lives, from sharing personal information or activities to communal networking. The fascination to be trendy and acquire followers, is compromising our privacy principles and places us at significant risk. It’s remarkably easy to pretend that we control what personal information we share, however, realistically we leave technological trails every day we login to these apps, or browse the internet. For the most part, it seems that …show more content…

Under the Bush Administration, the Protect America Act was passed in the wake of the terrorist attacks on September 11th, 2001. As a result, in 2007, the National Security Agency designed and operated a surveillance program called ‘Prism’. The programs’ intent is to gather web communications from major United States internet corporations. Under Section 702 of the FISA Amendments Act of 2008, Prism collects suspicious stored web communication and further employs communication companies such as, Verizon, to turn over all data that included court-approved terms, that indicated conspiracies targeted to compromise our national security. ("NSA PRISM Slides - IC OFF THE RECORD," 2013). Now, you may feel conflicted about their approach to securing our safety, but some are certain that this is undoubtedly a breech in our civil liberties. Lee (2013), states, “Civil liberties groups warned that the PAA 's vague requirements and lack of oversight would give the government a green light to seek indiscriminate access to the private communications of Americans. They predicted that the government would claim that they needed unfettered access to domestic communications to be sure they had gotten all relevant information about suspected terrorists.” Imagine we have a government that justifies spying on its citizens without any legal authorization to do so. The exploit our trust by suggesting that they

Get Access