How Much Access Does the Government Want from your Gadgets?

By

George Orwell’s Nineteen Eighty-Four introduced many concepts that gave the government in Oceania unlimited powers regarding its citizens. Although it’s a work of fiction, Orwell was able to see how information could be used to keep track of everyone.

Every time you text, e-mail, tweet or call your closest friend, family member, lover or coworkers, you’re putting your thought out there – susceptible to interception by government organizations or anyone with the right know how. The question is how much access, if any, the government should have to your digital communique.

If you’re like most Americans, the answer is “none,” but the government begs to differ, and it wants to pass laws to ensure it can gain more access to this information whenever it wants – if it feels the need to do so warrants it.

The government is increasingly using different methods to track it citizens. In the past two years the percentage the Justice Department received for authorization to access e-mail and network data on individuals increased by 361 percent. At the same time, the number of court orders for pen registers, and trap and trace devices on phones, increased from 25,535 in 2009 to 37,616 in 2011, while cell phone carriers received 1.3 million demands for information about their subscribers in 2011.

The amount of request and court orders being granted to government agencies means the data is already being accumulated. Whether you’ve given service providers permission is irrelevant, because the ability to intercept the information from your device is built into the phone company’s call routing hardware.

If you are online surfing, the same tool used for analytics provides detailed information about your online activities, and it can be used against you in a criminal or other type of examination.

The U.S. Senate will be debating whether to grant police officers more authority to search through your e-mail without warrants this week, and as horrific criminal cases validating the violation of these fundamental rights are highlighted in the news, it’s only a matter of time before our namby-pamby members of congress are swayed to vote for the outcome that doesn’t take the protection of our privacy and freedom into consideration.




Edited by Braden Becker
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Contributing Writer

SHARE THIS ARTICLE
Related Articles

Can Science Outsmart Deepfake Deceivers? Klick Labs Proposes an Emerging Solution

By: Alex Passett    3/25/2024

Researchers at Klick Labs were able to identify audio deepfakes from authentic audio recordings via new vocal biomarker technology (alongside AI model…

Read More

Top 5 Best Ways to Integrate Technology for Successful Project-Based Learning

By: Contributing Writer    3/19/2024

Project-based learning, also popularly known as the PBL curriculum, emphasizes using and integrating technology with classroom teaching. This approach…

Read More

How to Protect Your Website From LDAP Injection Attacks

By: Contributing Writer    3/12/2024

Prevent LDAP injection attacks with regular testing, limiting access privileges, sanitizing user input, and applying the proper encoding functions.

Read More

Azure Cost Optimization: 5 Things You Can Do to Save on Azure

By: Contributing Writer    3/7/2024

Azure cost optimization is the process of managing and reducing the overall cost of using Azure. It involves understanding the resources you're using,…

Read More

Massive Meta Apps and Services Outage Impacts Users Worldwide

By: Alex Passett    3/5/2024

Meta's suite of apps and services are experiencing major global outages on Super Tuesday 2024.

Read More