Messages to the Presidents of the World
|44th President of the United States|
|In office January 20, 2009 – January 20, 2017|
|Vice President||Joe Biden|
|Preceded by||George W. Bush|
|Succeeded by||Donald Trump|
|United States Senator from Illinois|
|In office January 3, 2005 – November 16, 2008|
|Preceded by||Peter Fitzgerald|
|Succeeded by||Roland Burris|
|Member of the Illinois Senate from the 13th district|
|In office January 8, 1997 – November 4, 2004|
|Preceded by||Alice Palmer|
|Succeeded by||Kwame Raoul|
|Born||Barack Hussein Obama II(1961-08-04) August 4, 1961 (age 55)Honolulu, Hawaii, U.S.|
|Spouse(s)||Michelle Robinson (m. 1992)|
|Relatives||See Family of Barack Obama|
|Awards||Nobel Peace Prize (2009)Profile in Courage Award (2017)|
the right to privacy
- Brie W.
- Tuesday, 11 November 2014
Dear Mr. President,
My name is Brianna Wilson. I am a senior and in part of my first semester of senior year, I am taking a semester of Government. Today I am writing you on the right to privacy which, personally, I find to be a too commonly violated right. With in writing this letter my hopes are for you, as our president, to continue, if not strengthen, the way we run things and insure that our right to privacy is being protected. As a child my right to privacy was violated and still is, for I was made an online sex trafficking victim by my own father true online photos and videos of his abuse from the age of 5 to the age of 12. Therefore I take this topic very seriously.
Recently I read an article written by David E. Sanger and Matt Apuzzo on 16 October 2014 titled James Comey, FBI Director, hints at action as cell phone data is locked. (NY Times) This article states the following things and at the bottom of this letter I will have the URL for you also. The director of the F.B.I., James B. Comey, said the "post-Snowden Pendulum" that has driven Apple and Google to offer fully encrypted cellphones had "gone too far". He later hinted that as a result of this, the administration might seek regulations and laws forcing companies to create a way for the government to unlock the photos, emails, contacts, etc. on the phones. It goes on to talk about how Comey had few answers for the critics arguing the point of national security and his position appeared at odds with the White House. Furthermore Apple and Google have announced new software that would automatically encrypt the content of cellphones, using codes that even the companies could not crack. Their announcement followed a year of disclosures from Edward J. Snowden, the former government contractor who revealed many government programs that collect electronic data, including information on Americans. The new encryption would hinder investigations involving phones taken from suspects, recovered at crime scenes or discovered on battlefields. But it would not affect information obtained by real-time wiretaps, such as phone conversations, emails or text messages. And the government could still get information that is stored elsewhere, including emails, call logs and, in some cases, old text messages.
This article continues to go more in detail as to what happened from there. What I want to address with my questions and concerns on this topic to you. My first question for you is how are you protecting our right to protection? I personally feel that when it comes to the safety of not only us, but also our country sometimes privacy needs to be violated. But with this it needs to be in a respectful and justified way while still at least respecting our right to privacy. I feel that this software and being able to see these things can be beneficial in many ways. For example in my life this could have help my case of being a sex tracking victim virtually. But also stuff like this hurt my case and made this crime easier to commit through share wear. All I ask of you is to find a happy medium of not only protecting our right to privacy the best that you can but respect it too. For example ask permission before just hacking into our devices, have a justified reason as to doing so, only take what you need and nothing more, and insure us that our private information will stay confidential. Thank you for your time Mr. President.