+44 203 318 3300 +61 2 7908 3995 help@nativeassignmenthelp.co.uk

Pages: 5

Words: 1263


Need an Assignment Helper in the UK? Native Assignment Help is here to support you every step of the way. Our skilled experts specialize in a wide range of subjects and are committed to delivering high-quality assignments that meet the highest academic standards.

Introduction - Dabate The Use Of Mass Surveillance Technology By Governments Assignment

The mass surveillance technology by governments is regarded as important to fight against terrorism, reduce crime and social unrest in the country. Even the country is able to ensure that they protest national security and manage the population (Wright and Varia, 2018). Mass surveillance tends to consider the population to indiscriminate the observation and incorporate systematic interference in the rights of the people for privacy and other associated rights (Chander, 2020). These rights also incorporate the right of freedom to express one's oneself and to protest.


In the present situation, the technology has taken the silence to the next level as there is no longer required of the spy glasses or dropping from the roofs' eves that is vital to make the significant observation of the people (Aradau, 2017). The government can observe the people now without making any physical presence. Surveillance technology is incorporated in society that results in the formation of fierce damage among the proponents and the opponents (Nay, 2020). The surveillance by the government has increased public scrutiny with the aspect that it increases security and opponent’s state that it hampers the privacy of the people. This technology tends to improve the process and affect the ethics of putting the individual under the process of surveillance. Thus many actions are observable, traced, recorded and this indicates that close surveillance is highly instructive when compared to the previous days. It was understood that mass surveillance is also regarded as passive or even undirected surveillance (Basu, 2019). But the targeted surveillance is regarded as the surveillance developed by focusing on any specific person and can incorporate the utilization of the specific powers done by the authorized public agencies. This targeted surveillance is undertaken overtly or in the way of covertly and this involves the rights of humans, unlike Mass surveillance. This indicates that mass surveillance technology has a negative impact on the rights of human beings (Greitens, 2020). The technologies that can be used by the government for undertaking mass surveillance are scanning networks of mobile phones, reading emails, and even texting messages. The other technologies are censoring web pages, using GPS for tracking the movement of citizens and others.


From the above discussion, it can be concluded that there is an ongoing debate in terms of the effect laid by government surveillance. It is stated that on one hand it tends to be considered as improving security but again it was considered as invading the privacy of people by not giving them privacy rights. In consideration of this, the target surveillance tends to favor the right of privacy of the people.

Reference list


Aradau, C. (2017). Assembling (non) knowledge: Security, law, and surveillance in a digital world. International Political Sociology11(4), 327-342. Retrieved From: https://academic.oup.com/ips/article-pdf/11/4/327/22522190/olx019.pdf [Retrieved On: 06.11.2021]

Basu, A. (2019). Extraterritorial Algorithmic Surveillance and the Incapacitation of International Human Rights Law. NUJS L. Rev.12, 189. Retrieved From: http://nujslawreview.org/wp-content/uploads/2019/12/12.2-Basu.pdf [Retrieved On: 06.11.2021]

Chander, A. (2020). Is Data Localization a Solution for Schrems II?. Journal of International Economic Law23(3), 771-784. Retrieved From: https://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=3318&context=facpub [Retrieved On: 06.11.2021]

Churcher, J. (2017, July). A new ‘fact of life’: mass surveillance of telecommunications and its implications for psychoanalytic confidentiality. In 50th Congress of the International Psychoanalytical Association, Buenos Aires (pp. 25-29). Retrieved From: https://www.researchgate.net/profile/John_Churcher/publication/312560324_A_new_'fact_of_life'_mass_surveillance_of_telecommunications_and_its_implications_for_psychoanalytic_confidentiality/links/5b7a8c4aa6fdcc5f8b55c7bb/A-new-fact-of-life-mass-surveillance-of-telecommunications-and-its-implications-for-psychoanalytic-confidentiality.pdf [Retrieved On: 06.11.2021]

Gohdes, A. R. (2020). Repression technology: Internet accessibility and state violence. American Journal of Political Science64(3), 488-503. Retrieved From: http://www.anitagohdes.net/uploads/2/7/2/3/27235401/gohdes_repressiontech_ajps.pdf [Retrieved On: 06.11.2021]

Greitens, S. C. (2020). Dealing with Demand for China’s Global Surveillance Exports. Brookings Institution Global China Report. Retrieved from:https://www.brookings.edu/wp-content/uploads/2020/04/FP_20200428_china_surveillance_greitens_v3.pdf [Retrieved on: 15.10.2021]

Helbing, D., Caron, & Helbing. (2019). Towards digital enlightenment. New York, NY: Springer International Publishing. Retrieved From: http://sgpwe.izt.uam.mx/files/users/uami/atm/BOOKS/Libros_AI-DS-Programing/Helbing_et_al_Towards_Digital_Enlightenment2019.pdf [Retrieved On: 06.11.2021]

Hynes, M. (2021). Online Privacy and Surveillance. In The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution. Emerald Publishing Limited. Retrieved From: https://www.emerald.com/insight/content/doi/10.1108/978-1-83909-976-220211006/full/pdf [Retrieved On: 06.11.2021]

Kitchin, R. (2020). Civil liberties or public health, or civil liberties and public health? Using surveillance technologies to tackle the spread of COVID-19. Space and Polity24(3), 362-381. Retrieved From: https://kitchin.org/wp-content/uploads/2021/01/SP-2020-civil-liberties-and-public-health.pdf [Retrieved On: 06.11.2021]

Knodel, M. Public Health, Big Tech, and Privacy Squaring the Contact-Tracing Circle. COVID-19 and the Information Space Boosting the Democratic Response, 44. Retrieved From: https://www.ned.org/wp-content/uploads/2021/01/Global-Insights-COVID-19-Information-Space-Boosting-Democratic-Response-1.pdf#page=44 [Retrieved On: 06.11.2021]

Lashmar, P. (2018). Journalistic freedom and the surveillance of journalists post-Snowden. Retrieved From: https://openaccess.city.ac.uk/id/eprint/20631/10/ [Retrieved On: 06.11.2021]

Li, C., Mirosa, M., & Bremer, P. (2020). Review of online food delivery platforms and their impacts on sustainability. Sustainability12(14), 5528. Retrieved from:https://www.mdpi.com/2071-1050/12/14/5528/pdf [Retrieved on: 15.10.2021]

Nay, O. (2020). Can a virus undermine human rights?. The Lancet Public Health5(5), e238-e239. Retrieved from:https://www.sciencedirect.com/science/article/am/pii/S246826672030092X [Retrieved on: 15.10.2021]

Nyst, C. (2018). Secrets and Lies: The Proliferation of State Surveillance Capabilities and the Legislative Secrecy Which Fortifies Them–An Activist's Account. State Crime Journal7(1), 8-23. Retrieved From: https://www.jstor.org/stable/pdf/10.13169/statecrime.7.1.0008.pdf [Retrieved On: 06.11.2021]

Prabhash, M. A. M. (2020). The consumer perception on online food delivery system among youth in kerala. EPRA International Journal of Multidisciplinary Research (IJMR)6(2), 96-100. Retrieved from:https://eprajournals.com/jpanel/images/pseditor/IJMR%20FEB%202020%20FULL%20JOURNAL.pdf#page=102 [Retrieved on: 15.10.2021]

Savage, S. (2018, October). Lawful device access without mass surveillance risk: A technical design discussion. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1761-1774). Retrieved From: http://cseweb.ucsd.edu/~savage/papers/lawful.pdf [Retrieved On: 06.11.2021]

Swarnalatha, P., Pandey, N., Agrawal, G., Mathur, N., & Pandey, S. (2019). An Insight on Existing Online Food Delivery Applications in India and Proposition of a New Model. International Journal of Progressive Sciences and Technologies17(2), 80-85. Retrieved from:http://www.ijpsat.es/index.php/ijpsat/article/download/1281/745 [Retrieved on: 15.10.2021]

Wright, C. and Varia, M., 2018, April. Crypto crumple zones: Enabling limited access without mass surveillance. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 288-306). IEEE. Retrieved from:http://web.cecs.pdx.edu/~cvwright/papers/crumplezones.pdf [Retrieved on: 15.10.2021]

Recently Download Samples by Customers
Our Exceptional Advantages
Complete your order here
54000+ Project Delivered
Get best price for your work

Ph.D. Writers For Best Assistance

Plagiarism Free

No AI Generated Content

offer valid for limited time only*