really the focal point and not so much what is actually on specific databases and systems.
Citizens and private organizations should also have a choice in the matter. Empowering
those that would not like to sacrifice their right with the information needed to secure themselves
is a way for the United States government to take care of their people while still allowing them to
have their privacy (Dean, 2017).
On the business side of things, those organizations that feel as
if they can stand without the assistance of the federal government should be given that right.
Allowing the private citizens and organizations the choice ensures the government is not being
overly intrusive in their national security practices. Also to get more in depth, even if citizens
would like to relinquish their privacy rights, they should still have control over what the
government is able to access. Instead of relinquishing all privacy rights, the government should
be able to tell the citizens what they need to access in order to keep them secure. The ability to
come to a compromise by both the citizen and the government will allow for an optimal level of
national security.
10

Blockchain Implementation
Blockchain technology to allow digital information to be distributed without being copied.
Blockchain technology introduced the ability to share information but still maintain ownership of
such information. Blockchain was originally developed for the release of the famous
cryptocurrency known as BitCoin. After Bitcoin’s rise and demise, the use of blockchain can be
found in other technology implementations. Many people don’t really know how blockchain
actually works but you do not need to understand it in order to invest in it and that may be why
so many people were successful in the use of blockchain (Jeffries, 2018).
Don and Alex Tapscott authors of the Blockchain Revolution explained the concept as “The
blockchain is an incorruptible digital ledger of economic transactions that can be programmed to
record not just financial transactions but virtually everything of value”. We can expound on the
definition by analyzing exactly how blockchain works (Bergman 2018). Blockchain can be best
explained as a spreadsheet that has been duplicated and can be accessed across a large network of
computers. The database that holds the information is constantly reconciled and updated. It can
be considered as very safe because since it is a culmination of information across a large
spectrum, it cannot really be centrally hacked. There is no single point of failure nor a single
point of control of the information, it is considered as public information.
The term block derives from the intervals in which the information is updated on the ledger. The
term chain derives from the network of nodes connected together to make the information
connect. The act of the updating the information across the network in intervals is what gives the
concept the name block chain (Jeffries, 2018).
