Moore’s law dictates that approximately every two years,...
Moore s law dictates that approximately every two years, hardware computer processing power and
memory capacity doubles. Through the ordinary lens, this exponential trend might be viewed as a
blessing, endlessly increasing the capabilities of technology and science. However, perhaps when
examined in a social context, such a trend unveils perverse possibilities. Every two years, the potential
for government surveillance increases by an order of magnitude. And although the Bankston Soltani
principle described in Snowden s TED talk, Here s How We Take Back the Internet , asserts that every
time this occurs the public must revisit and rebalance their rights to privacy, it seems as though such
discussions have seldom been on the headlines ... Show more content on Helpwriting.net ...
In addition, the article also describes the profiling system of the U.S. Customs and Border Protection
which assigns a terrorist risk assessment score to all citizens entering or leaving America. However,
although individuals can never discover their score, it may hinder their ability to obtain a visa, student
grant, or state job. Such are disconcerting examples of bureaucratic influence unethically hindering
individuals function in theoretically democratic countries. These exemplify that individuals rarely
contemplate the possibly malignant nature of such activities if they exist in democratic countries but
immediately criticize similar activities, such as Chinese residency cards, in countries more
authoritarian in shape or form.
Although the mere presence of security cameras and profiling systems is hardly considered distressing
to most, more malevolent creatures assuredly lie underneath the superficial surface. The PRISM
program, launched by the National Security Agency and leaked by NSA contractor Edward Snowden,
is such a creature. According to the Washington Post article NSA Slides Explain the PRISM Data
Collection Program , it is a clandestine mass surveillance program that essentially deputizes server
providing corporations such as Microsoft, Apple, and Google among many others, to amass data for
data mining purposes. Furthermore, the packets of data garnered
... Get more on HelpWriting.net ...