An Invasion of Privacy? | Introduction | Background | Potential Benefits | Legal and Ethical Issues | Security Concerns | Social Problems | Conclusion | Bibliography |
According to The Guardian (2013), the NSA uses their relationships with companies such as Facebook, Google and Microsoft to get things “like emails and messages straight from their servers.” The security of people’s information is uncertain in these aspects. In many ways, especially with the emergence of Facebook, a growing trend has been transparency. The web used to be a place where one could post anonymously, but now users are expected to have more accountability when it comes to what they say and do on the Internet. According to Greenwald, a NSA analyst with X-KEY SCORE access, a data collecting program, can compile a massive list of all visits to a particular website and from which computers (p. 156). For many, just the concept of someone looking into their every online transaction and location is enough to raise suspicion. However, one must consider that there most likely is not anyone tracking down their every move. Users of any social media network must presume that the seemingly private messages, pictures and content can be hacked by the NSA. A function of the X-KEY SCORE is to look through social media someone’s messages, chats and other private posts (p. 158). With this in mind, any message one puts on the internet is accessible and can be breeched, but in reality, the only information the NSA is looking for signs of terrorism.