Abstract
As never before there is a dynamic tension in the modern world. In democratic societies there is an assumed, but not really explicitly stated, right to privacy by individual citizens in how they think, vote, and act within the laws. Yet in a world that is increasingly threatened by terrorism—including cyber-terrorism—governments have become increasingly intrusive into citizen’s privacy. Modern telecommunications and digital networks can be monitored, and increasingly governmental security agencies are invading the privacy of individuals. This is a dynamic balance that shifted after the 9/11 attacks on the United States and fears about Level 3 cyber-attacks on critical national infrastructure. This chapter examines the conflict between privacy and security and how it is being addressed in the United States and around the world.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tom Risen, “FISA Judge Denies Surveillance Court Offers ‘Rubber Stamp’: Surveillance Court and NSA face scrutiny on email address collection” U.S. News & World Report, October 16, 2013 http://www.usnews.com/news/articles/2013/10/16/fisa-judge-denies-surveillance-court-offers-rubber-stamp.
Lichtblau, Eric (July 6, 2013), "In Secret, Court Vastly Broadens Powers of N.S.A." The New York Times. Retrieved July 9, 2013.
Alison Smale, “Anger Growing Among Allies on U.S. Spying” The New York Times, Oct. 23, 2013. http://www.nytimes.com/2013/10/24/world/europe/united-states-disputes-reports-of-wiretapping-in-Europe.html?_r=0.
David Meyer, “UK terror law amendments would bring back ‘Snooper’s Charter.’” Jan. 22, 2015. https://gigaom.com/2015/01/22/uk-terror-law-amendments-would-bring-back-snoopers-charter/.
“Europe’s Cyber Security Policy Settings Under Attack” Space Daily, May 4, 2014. http://www.spacedaily.com/reports/Europes_cybersecurity_policy_settings_under_attack_999.html.
Keven Bankston, “West Coast vs. East Coast: The crypto cold war between the feds and the tech industry just got hot.” Slate, February 25, 2015. http://www.slate.com/articles/technology/future_tense/2015/02/yahoo_s_alex_stamos_and_nsa_s_mike_rogers_fight_about_encryption.html.
Ibid.
James Bamford, “NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” Wired, March 15, 2012. http://www.wired.com/2012/03/ff_nsadatacenter/.
Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts, White House Press release, Jan. 13, 2015. https://www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislation.
Where to get PGP(Pretty Good Privacy). www.cryptography.org/getpgp.htm.
Ellen Nakashima “Congress Gets Moving on Long-Sought Cyber Bill” Washington Post, March 25, 2015 P. A-6.
“Pressure to Rein in NSA Data Collection” Washington Post, March 25, 2015, P. A-6.
U.S.A. Freedom Act Passed, USA Today, June 2, 2015, http://www.usatoday.com/story/news/politics/2015/06/02/patriot-act-usa-freedom-act-senate-vote/28345747/.
Joseph N. Pelton, e-Sphere: The Rise of the World Wide Mind. (2000) Quorum Books, Westport, Connecticut.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Pelton, J.N., Singh, I.B. (2015). Is Anyone Looking Out for You? Your Government? Businesses Where You Trade? Your Neighbor? or Just Yourself?. In: Digital Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-19953-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-19953-5_3
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19952-8
Online ISBN: 978-3-319-19953-5
eBook Packages: EngineeringEngineering (R0)