Iliana Vega Messerschmidt ENC 1101 11 March 2016 Surveillance and Privacy: Government Security: An Annotated Bibliography Eyre, William. The Real ID Act. El Paso: LFB Scholarly Publishing LC, 2011. Print. “The Real” written by Eyre to inform readers of the real ID act and other surveillance laws based on the US Government. He talks about the surveillance that is emplaced today, and how privacy is a right. He also explains how the theory of surveillance came into effect. It helps me by giving the important laws that have been passed. The book informs the reader with actual dates the laws of surveillance, security, and privacy were passed. The book also helps along with my other sources by prevailing important laws and statics in detail when …show more content…
Mills gives the reasoning behind the current governments surveillance laws in place. Then he writes how Edward Snowden exposed the NSA and how the Federal Government was violating privacy laws citizens had in the name of “counterterrorism”. The NSA is attempting to keep their surveillance programs secret and how they have future plans for more surveillance. Mills explains the history and future of surveillance, the informative passage helps by showing certain actions by the NSA and what they have and are willing to …show more content…
The government has surveillance cameras just about everywhere parks, ATM’s, buildings, landmarks. There really is no privacy if you really think about it. An example Golbeck gave everything we say, do, or buy it is somehow all imputed into data. This information can be sold or used against you. No matter what you do something or someone is really always watching what you say or do. Golbeck’s biased article informs readers of their rights to privacy. Her article helps my paper because she gives examples of the rights individuals have and what it means. Marmor, Andrei. “What is The Right to Privacy?” Wiley Blackwell, 43.1. 2015. Web. 2015. The author Marmor gives his insight on the issue of rights to privacy, and how someone can be protected. He finds error and discusses how rights to privacy are being violated. He also used philosopher Judith Thomson 's insight also on the issue and has his points on the interest of the people. We also hear arguments how people can avoid having their privacy invaded by things individuals do to themselves. Marmor’s audience is everyone, anyone who could be a potential risk of their privacy being violated. The author’s biased view helps me with my paper by adding facts and ways to prevent someone to be targeted. "Tech giant Apple is resisting a court directive that it help the FBI gain access to the iPhone