Security vs. Privacy at “The Program” Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

The discussion of the relations between security and privacy has been a long and complicated one. With the revelations of Edward Snowden hitting the media, the dormant conflict escalated once again. This paper will discuss various implications of the National Surveillance Program based on the documentary “United States of Secrets.”

Movie Overview

The film describes in great detail the surveillance program which is simply called “The Program.” Former government officials retell the story of the system being authorized after the 9/11 terrorist attacks. The program was enacted after it became absolutely clear that the NSA could not fulfill its duties efficiently. Apparently, after the Nixon administration scandal, the agency designed to prevent such attacks has had its hands tied. In order to stop further catastrophes, the president authorized the creation of an enormous surveillance network designed to gather massive amounts of information. After “The Program” started, it began collecting emails, phone calls and other pieces of data from the citizens of the US and other countries. Initially, it was supposed to protect the personal data by encrypting it, but that protocol has been removed. The documentary denotes the fact that the surveillance is inherently unethical, politically stupid, and violates the Constitution. The movie also gives an account of how Edward Snowden became a whistleblower and of the massive backlash it caused. It also notes the efforts of other people to disclose the issue and how they were silenced.

Security vs. Privacy

According to the movie, the existence of “The Program” has been justified by the risks which existed at the time. The 9/11 attacks have triggered a massive hysteria which made the solution seem legitimate for many government officials. However, the program was exposed twelve years later, and it was still going. After the US military operations in the Middle East, the terrorist threat should have been hampered making such extreme measures entirely unnecessary. And the surveillance continues to this day, despite receiving harsh criticism. It is clear that at this point the wartime authority which allowed General Hayden to create the program no longer applies. While the surveillance protocol was designed to address a huge security issue, it was unethical even at the time. Violating the privacy of the US citizens is not justifiable under any circumstances. It is particularly true today when the immediate threat is gone.

Is There a Solution?

I think, it is clear that “The Program” is an obscene abuse of power by the government. However, some sort of effective surveillance system is clearly necessary to ensure the national security. And the most horrifying part of the whole story is the fact that an ethical solution existed even at the time “The Program” was established. The ThinLine protocol addressed all of the concerns regarding the program by encrypting the collected data and ensuring anonymity. But that solution was rejected for no apparent reason. That raises a lot of questions about the decision-making process in the government and the true aims of the current surveillance system. Overall, the only real solution to the conflict between security and privacy is ensuring that the government follows a strict ethical code and the principles of the Constitution. That can be helped by supporting the whistleblowers and protesting against them being prosecuted.

Conclusion

“United States of Secrets” demonstrates how the government can abuse its power under the pretense of protecting the citizens. It is hard to see how such privacy violation can be justified. There is no clear-cut solution to the conflict between the privacy and security concerns but the refusal to even address it is not an answer.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, January 21). Security vs. Privacy at “The Program”. https://ivypanda.com/essays/security-vs-privacy-at-the-program/

Work Cited

"Security vs. Privacy at “The Program”." IvyPanda, 21 Jan. 2022, ivypanda.com/essays/security-vs-privacy-at-the-program/.

References

IvyPanda. (2022) 'Security vs. Privacy at “The Program”'. 21 January.

References

IvyPanda. 2022. "Security vs. Privacy at “The Program”." January 21, 2022. https://ivypanda.com/essays/security-vs-privacy-at-the-program/.

1. IvyPanda. "Security vs. Privacy at “The Program”." January 21, 2022. https://ivypanda.com/essays/security-vs-privacy-at-the-program/.


Bibliography


IvyPanda. "Security vs. Privacy at “The Program”." January 21, 2022. https://ivypanda.com/essays/security-vs-privacy-at-the-program/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1