Matches in SemOpenAlex for { <https://semopenalex.org/work/W2222298162> ?p ?o ?g. }
Showing items 1 to 76 of
76
with 100 items per page.
- W2222298162 startingPage "1207" @default.
- W2222298162 abstract "When Edward Snowden stole and released thousands of National Security Agency (NSA) documents,1 he exposed a massive secret governmental cybersurveillance operation.2 Although U.S. citizens might have anticipated that the U.S. government was collecting information about terrorists and criminals, few could have imagined the all-encompassing nature of the NSA surveillance program.3 With a budget of $10.8 billion per year4 and 35,000 employees,5 the NSA was systematically collecting data about virtually everyone and everything, amassing millions of cell phone call records, e-mails, text messages, credit-card-purchase records, and information social media networks.6 In addition, the NSA created a system that enabled it easily access Yahoo and Google accounts.7 The end result was that the NSA intercepted some 182 million communication records, including to and from e-mail as well as text, audio, and video information.8The cybersurveillance program was shrouded in secrecy in that U.S. governmental officials were neither open nor truthful regarding the size and scope of the NSA program. For example, President Obama assured the U.S. public that the NSA was not targeting ordinary U.S. citizens, but rather was focused only on communications individuals who posed a terrorist the United States (for example, communications of intelligence value9 and foreign intelligence targets).10 The President also boldly proclaimed, Nobody is listening your telephone calls.11 Likewise, the NSA declared that it was not storing private online or phone information except under limited circumstances: when it believed that the recording or transcript contained intelligence information, evidence of a possible crime, a threat of serious harm life or property, or could shed light on technical issues like encryption or vulnerability cyber attacks.12 However, it soon became clear that the NSA had established a huge data storage center (taking advantage of the declining cost of data storage and advances in search software)13 and was routinely collecting extraordinarily large amounts of information regarding virtually everyone.14 As a result, even if Americans were not the intended targets of NSA eavesdropping, they routinely fell into the agency's global net.15The NSA surveillance program raises fundamental questions regarding the relationship between the U.S. government and the U.S. citizenry. Undoubtedly, government has a legitimate interest in investigating and collecting information regarding suspected terrorists. Government also has a legitimate interest in shielding certain types of information (for example, state secrets or vital information that is potentially damaging national security or foreign relations) public disclosure.16 However, the question is one of balance. In a democratic society, legitimate questions might be raised regarding whether the government should be involved in such broad-based surveillance, and whether it should be conducting such operations in secret without democratic accountability.I. The Founding Generation's Skepticism of Government: Separation of Powers and Checks and BalancesThe NSA cybersurveillance program raises a host of troubling issues for U.S. citizens. Although the Framers of the U.S. Constitution embraced (to a greater or lesser extent) democratic principles, they remained highly distrustful of a powerful government-even a democratically elected one.17 Illustrative were the views of Thomas Paine, who argued, Society in every state is a blessing, but government even in its best state is but a necessary evil; in its worst state an intolerable one.18This distrust was probably rooted in a variety of considerations. First, the American Revolution was precipitated by grievances against the British government, and in particular alleged abuses by the British monarch.19 Indeed, the U.S. Declaration of Independence details a long list of purported grievances against, and alleged abuses by, the British King. …" @default.
- W2222298162 created "2016-06-24" @default.
- W2222298162 creator A5088358398 @default.
- W2222298162 date "2015-07-01" @default.
- W2222298162 modified "2023-09-23" @default.
- W2222298162 title "Cybersurveillance in a Free Society" @default.
- W2222298162 hasPublicationYear "2015" @default.
- W2222298162 type Work @default.
- W2222298162 sameAs 2222298162 @default.
- W2222298162 citedByCount "0" @default.
- W2222298162 crossrefType "journal-article" @default.
- W2222298162 hasAuthorship W2222298162A5088358398 @default.
- W2222298162 hasConcept C108827166 @default.
- W2222298162 hasConcept C136764020 @default.
- W2222298162 hasConcept C138885662 @default.
- W2222298162 hasConcept C145097563 @default.
- W2222298162 hasConcept C17744445 @default.
- W2222298162 hasConcept C199539241 @default.
- W2222298162 hasConcept C2776452267 @default.
- W2222298162 hasConcept C2776552730 @default.
- W2222298162 hasConcept C2778137410 @default.
- W2222298162 hasConcept C2778707766 @default.
- W2222298162 hasConcept C2983355114 @default.
- W2222298162 hasConcept C38652104 @default.
- W2222298162 hasConcept C41008148 @default.
- W2222298162 hasConcept C41895202 @default.
- W2222298162 hasConcept C517823627 @default.
- W2222298162 hasConcept C518677369 @default.
- W2222298162 hasConcept C528167355 @default.
- W2222298162 hasConceptScore W2222298162C108827166 @default.
- W2222298162 hasConceptScore W2222298162C136764020 @default.
- W2222298162 hasConceptScore W2222298162C138885662 @default.
- W2222298162 hasConceptScore W2222298162C145097563 @default.
- W2222298162 hasConceptScore W2222298162C17744445 @default.
- W2222298162 hasConceptScore W2222298162C199539241 @default.
- W2222298162 hasConceptScore W2222298162C2776452267 @default.
- W2222298162 hasConceptScore W2222298162C2776552730 @default.
- W2222298162 hasConceptScore W2222298162C2778137410 @default.
- W2222298162 hasConceptScore W2222298162C2778707766 @default.
- W2222298162 hasConceptScore W2222298162C2983355114 @default.
- W2222298162 hasConceptScore W2222298162C38652104 @default.
- W2222298162 hasConceptScore W2222298162C41008148 @default.
- W2222298162 hasConceptScore W2222298162C41895202 @default.
- W2222298162 hasConceptScore W2222298162C517823627 @default.
- W2222298162 hasConceptScore W2222298162C518677369 @default.
- W2222298162 hasConceptScore W2222298162C528167355 @default.
- W2222298162 hasIssue "3" @default.
- W2222298162 hasLocation W22222981621 @default.
- W2222298162 hasOpenAccess W2222298162 @default.
- W2222298162 hasPrimaryLocation W22222981621 @default.
- W2222298162 hasRelatedWork W1566883406 @default.
- W2222298162 hasRelatedWork W1592997711 @default.
- W2222298162 hasRelatedWork W1986643365 @default.
- W2222298162 hasRelatedWork W1988176167 @default.
- W2222298162 hasRelatedWork W226295541 @default.
- W2222298162 hasRelatedWork W2338687312 @default.
- W2222298162 hasRelatedWork W248210944 @default.
- W2222298162 hasRelatedWork W2733909866 @default.
- W2222298162 hasRelatedWork W3121523226 @default.
- W2222298162 hasRelatedWork W3122516843 @default.
- W2222298162 hasRelatedWork W3123040855 @default.
- W2222298162 hasRelatedWork W3123603186 @default.
- W2222298162 hasRelatedWork W3123812816 @default.
- W2222298162 hasRelatedWork W3124384218 @default.
- W2222298162 hasRelatedWork W3125020679 @default.
- W2222298162 hasRelatedWork W748209857 @default.
- W2222298162 hasRelatedWork W777573616 @default.
- W2222298162 hasRelatedWork W829005064 @default.
- W2222298162 hasRelatedWork W836103467 @default.
- W2222298162 hasRelatedWork W2604898990 @default.
- W2222298162 hasVolume "72" @default.
- W2222298162 isParatext "false" @default.
- W2222298162 isRetracted "false" @default.
- W2222298162 magId "2222298162" @default.
- W2222298162 workType "article" @default.