Review of literature: Technology and the government
Many views are prevalent when discussing the role of technology in government and its effect on citizens and the government itself. Five main views argue a wide variety of points: technology helps the government benefit its citizens; technology is a useful weapon in anti-terrorism tactics; more transparency is needed in the government’s use of technology; the government has too much power when it comes to technology; and finally, the heavily critical extremist view on governmental use of technology.
The first view argues that the government is instrumental in providing benefits to citizens with their use of technology. Evidence suggests that increasing the prevalence of technology provides cheaper costs to the government and therefore the citizens as well (Stockwell). A book from 1999 argues that “government organizations have never been seen as natural innovators” (Margetts, 31) and later goes on to state that now in the digital age they can be (Margetts, 31). This argues alongside the view that the government now has the ability to be innovative with technology usage, and should be to provide benefits for their citizens. It is also a common thought that once the government sees a need in society for new technologies, “services and good will be delivered in new ways, and online channels are expected to play a significant role” (Roy). Such arguments align with the view that government exists to benefit its citizens and should use technology to do so.
Perhaps an offshoot of the first view mentioned, there exists a view that the government and its agencies should be more transparent with the usage of technology. Recent news regarding the NSA and their spying tactics has brought this view out even more. Before 9/11 the NSA could collect an American’s information only if he or she was acting on behalf on foreign interests. Today the NSA doesn’t even need a court order to do so (Stockwell). Senator Tom Udall has been quoted saying “We need to know what [the NSA] is doing and what their legal basis is for doing it” (Sargent). Overall, arguments in this general school of thought seem to suggest that the government needs to be more transparent with their usage of technology in order to “ensure they operate with more fidelity” (Stockwell).
Many of the people who categorize themselves with the view that the government uses technology to provide benefits to citizens also believe in government technology as a useful anti-terror tactic. From this comes a third view. In this day and age much has already been done with technology to combat terrorism. Technology such as more secure planes, electronic passports, and even technology to identify passengers posing a security risk by checking them against international databases are wisely supported in this view (Dunleavy, 207). A common argument is that “warfare has been transformed fundamentally by developments in information and communications technology” (Cornish). The overall theme from this school of thought is that “America is fighting some unconventional foes” (Cosgrove-Mather) which brings forth the need for unconventional uses of technology.
A more extreme take on the second view of believing that government should be more transparent is the view that the government has too much power when it comes to technology usage. An example of poor usage of technology is in Charlotte, North Carolina where the police were found using a surveillance system that collects info from cellphones to locate crime suspects. The technology, however, gathered data from innocent people (Clasen-Kelly). Recent news with the NSA has spurred support for this view as well. There is convincing evidence suggesting that Apple had complied with the NSA by adding a bug in their software that created a “leak” from which the NSA leeched user data (Elmer-DeWitt). The basis of this view lies in the belief that “the NSA has gained a secret window into the communications habits of millions of Americans”, a belief that has convincing evidence to prove it true (Cauley).
The last view is one of extremity. The view suggests that the government is like “big brother.” This school of thought also tends to align with support for anarchy which is why it is not within the scope of the other views, but deserves to be mentioned. Within this view there is a tendency to refer to the government as having a “constant hunger for more information” (Snyder). Suggestions of extreme spying tactics of the government such as street lights on every street that are bugged to listen in on private conversations are not uncommon (Snyder).
Ultimately, Government and politics is a touchy subject. When technology comes into the mix it provides a basis for multiple views on the topic to form. Believing that the government is obligated to use technology for good, the belief that the government must be more transparent with technology use, the thought that technology is instrumental in anti-terror efforts, and the view that the government has too much power with technology usage is not uncommon when discussing the topic. The extremist view aligning with anarchy is also not uncommon.
The first view argues that the government is instrumental in providing benefits to citizens with their use of technology. Evidence suggests that increasing the prevalence of technology provides cheaper costs to the government and therefore the citizens as well (Stockwell). A book from 1999 argues that “government organizations have never been seen as natural innovators” (Margetts, 31) and later goes on to state that now in the digital age they can be (Margetts, 31). This argues alongside the view that the government now has the ability to be innovative with technology usage, and should be to provide benefits for their citizens. It is also a common thought that once the government sees a need in society for new technologies, “services and good will be delivered in new ways, and online channels are expected to play a significant role” (Roy). Such arguments align with the view that government exists to benefit its citizens and should use technology to do so.
Perhaps an offshoot of the first view mentioned, there exists a view that the government and its agencies should be more transparent with the usage of technology. Recent news regarding the NSA and their spying tactics has brought this view out even more. Before 9/11 the NSA could collect an American’s information only if he or she was acting on behalf on foreign interests. Today the NSA doesn’t even need a court order to do so (Stockwell). Senator Tom Udall has been quoted saying “We need to know what [the NSA] is doing and what their legal basis is for doing it” (Sargent). Overall, arguments in this general school of thought seem to suggest that the government needs to be more transparent with their usage of technology in order to “ensure they operate with more fidelity” (Stockwell).
Many of the people who categorize themselves with the view that the government uses technology to provide benefits to citizens also believe in government technology as a useful anti-terror tactic. From this comes a third view. In this day and age much has already been done with technology to combat terrorism. Technology such as more secure planes, electronic passports, and even technology to identify passengers posing a security risk by checking them against international databases are wisely supported in this view (Dunleavy, 207). A common argument is that “warfare has been transformed fundamentally by developments in information and communications technology” (Cornish). The overall theme from this school of thought is that “America is fighting some unconventional foes” (Cosgrove-Mather) which brings forth the need for unconventional uses of technology.
A more extreme take on the second view of believing that government should be more transparent is the view that the government has too much power when it comes to technology usage. An example of poor usage of technology is in Charlotte, North Carolina where the police were found using a surveillance system that collects info from cellphones to locate crime suspects. The technology, however, gathered data from innocent people (Clasen-Kelly). Recent news with the NSA has spurred support for this view as well. There is convincing evidence suggesting that Apple had complied with the NSA by adding a bug in their software that created a “leak” from which the NSA leeched user data (Elmer-DeWitt). The basis of this view lies in the belief that “the NSA has gained a secret window into the communications habits of millions of Americans”, a belief that has convincing evidence to prove it true (Cauley).
The last view is one of extremity. The view suggests that the government is like “big brother.” This school of thought also tends to align with support for anarchy which is why it is not within the scope of the other views, but deserves to be mentioned. Within this view there is a tendency to refer to the government as having a “constant hunger for more information” (Snyder). Suggestions of extreme spying tactics of the government such as street lights on every street that are bugged to listen in on private conversations are not uncommon (Snyder).
Ultimately, Government and politics is a touchy subject. When technology comes into the mix it provides a basis for multiple views on the topic to form. Believing that the government is obligated to use technology for good, the belief that the government must be more transparent with technology use, the thought that technology is instrumental in anti-terror efforts, and the view that the government has too much power with technology usage is not uncommon when discussing the topic. The extremist view aligning with anarchy is also not uncommon.
Bibliography
1) Cauley, Leslie. "NSA Has Massive Database of Americans' Phone Calls." USA Today. USA TODAY, 11 May 2006. Web. 22 Oct. 2014.
2) Clasen-Kelly, Fred. "Charlotte, N.C., Police Investigators Secretly Track Cellphones." Charlotte, N.C., Police Investigators Secretly Track Cellphones. E.Republic, Inc., 20 Oct. 2014. Web. 22 Oct. 2014.
3) Cornish, Paul. "Technology, Strategy and Counterterrorism." International Affairs 86.4 (2010): 875-88. Web.
4) Cosgrove-Mather, Bootie. "Anti-Terrorism Technology." CBS News. CBS News, 12 June 2002. Web. 22 Oct. 2014.
5) Dunleavy, Patrick. Digital Era Governance IT Corporations, the State, and E-government. Oxford: Oxford UP, 2006. Print.
6) Elmer-DeWitt, Philip. "Apple’s Security Bug: Five NSA Conspiracy theories." Fortune. Time Inc., 23 Feb. 2014. Web. 22 Oct. 2014.
7) Margetts, Helen. Information Technology in Government Britain and America. London: Routledge, 1999. Print.
8) Roy, Jeffrey. "Introduction: E-Government." Social Science Computer Review 21.1 (2003): 3-5. Web.
9) Sargent, Greg. "We Need More Transparency and Debate around NSA Phone Records Program."The Washington Post. The Washington Post, 6 June 2013. Web. 22 Oct. 2014.
10) Snyder, Michael. "32 Privacy Destroying Technologies That Are Systematically Transforming America Into A Giant Prison." The Truth. The Truth, 27 Nov. 2013. Web. 22 Oct. 2014.
11) Stockwell, Mel. "3 Views on NSA Reform." The Christian Science Monitor. The Christian Science Monitor, 20 Oct. 2014. Web. 22 Oct. 2014.
12) Stockwell, Mel. "The Future of Government Technology and the Role of the IT Department -- Washington Technology." Washington Technology. Media, Inc., 20 Oct. 2014. Web. 22 Oct. 2014.
2) Clasen-Kelly, Fred. "Charlotte, N.C., Police Investigators Secretly Track Cellphones." Charlotte, N.C., Police Investigators Secretly Track Cellphones. E.Republic, Inc., 20 Oct. 2014. Web. 22 Oct. 2014.
3) Cornish, Paul. "Technology, Strategy and Counterterrorism." International Affairs 86.4 (2010): 875-88. Web.
4) Cosgrove-Mather, Bootie. "Anti-Terrorism Technology." CBS News. CBS News, 12 June 2002. Web. 22 Oct. 2014.
5) Dunleavy, Patrick. Digital Era Governance IT Corporations, the State, and E-government. Oxford: Oxford UP, 2006. Print.
6) Elmer-DeWitt, Philip. "Apple’s Security Bug: Five NSA Conspiracy theories." Fortune. Time Inc., 23 Feb. 2014. Web. 22 Oct. 2014.
7) Margetts, Helen. Information Technology in Government Britain and America. London: Routledge, 1999. Print.
8) Roy, Jeffrey. "Introduction: E-Government." Social Science Computer Review 21.1 (2003): 3-5. Web.
9) Sargent, Greg. "We Need More Transparency and Debate around NSA Phone Records Program."The Washington Post. The Washington Post, 6 June 2013. Web. 22 Oct. 2014.
10) Snyder, Michael. "32 Privacy Destroying Technologies That Are Systematically Transforming America Into A Giant Prison." The Truth. The Truth, 27 Nov. 2013. Web. 22 Oct. 2014.
11) Stockwell, Mel. "3 Views on NSA Reform." The Christian Science Monitor. The Christian Science Monitor, 20 Oct. 2014. Web. 22 Oct. 2014.
12) Stockwell, Mel. "The Future of Government Technology and the Role of the IT Department -- Washington Technology." Washington Technology. Media, Inc., 20 Oct. 2014. Web. 22 Oct. 2014.