Is Anyone Looking Out for You? Your Government? Businesses Where You Trade? Your Neighbor? or Just Yourself?
- 1.1k Downloads
As never before there is a dynamic tension in the modern world. In democratic societies there is an assumed, but not really explicitly stated, right to privacy by individual citizens in how they think, vote, and act within the laws. Yet in a world that is increasingly threatened by terrorism—including cyber-terrorism—governments have become increasingly intrusive into citizen’s privacy. Modern telecommunications and digital networks can be monitored, and increasingly governmental security agencies are invading the privacy of individuals. This is a dynamic balance that shifted after the 9/11 attacks on the United States and fears about Level 3 cyber-attacks on critical national infrastructure. This chapter examines the conflict between privacy and security and how it is being addressed in the United States and around the world.
KeywordsCredit Card Internet Protocol Address Social Security Agency Telecommunication Carrier Advance Persistent Threat
- 1.Tom Risen, “FISA Judge Denies Surveillance Court Offers ‘Rubber Stamp’: Surveillance Court and NSA face scrutiny on email address collection” U.S. News & World Report, October 16, 2013 http://www.usnews.com/news/articles/2013/10/16/fisa-judge-denies-surveillance-court-offers-rubber-stamp.
- 2.Lichtblau, Eric (July 6, 2013), "In Secret, Court Vastly Broadens Powers of N.S.A." The New York Times. Retrieved July 9, 2013.Google Scholar
- 3.Alison Smale, “Anger Growing Among Allies on U.S. Spying” The New York Times, Oct. 23, 2013. http://www.nytimes.com/2013/10/24/world/europe/united-states-disputes-reports-of-wiretapping-in-Europe.html?_r=0.
- 4.David Meyer, “UK terror law amendments would bring back ‘Snooper’s Charter.’” Jan. 22, 2015. https://gigaom.com/2015/01/22/uk-terror-law-amendments-would-bring-back-snoopers-charter/.
- 5.“Europe’s Cyber Security Policy Settings Under Attack” Space Daily, May 4, 2014. http://www.spacedaily.com/reports/Europes_cybersecurity_policy_settings_under_attack_999.html.
- 6.Keven Bankston, “West Coast vs. East Coast: The crypto cold war between the feds and the tech industry just got hot.” Slate, February 25, 2015. http://www.slate.com/articles/technology/future_tense/2015/02/yahoo_s_alex_stamos_and_nsa_s_mike_rogers_fight_about_encryption.html.
- 7.Ibid.Google Scholar
- 8.James Bamford, “NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” Wired, March 15, 2012. http://www.wired.com/2012/03/ff_nsadatacenter/.
- 9.Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts, White House Press release, Jan. 13, 2015. https://www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislation.
- 10.Where to get PGP(Pretty Good Privacy). www.cryptography.org/getpgp.htm.
- 11.Ellen Nakashima “Congress Gets Moving on Long-Sought Cyber Bill” Washington Post, March 25, 2015 P. A-6.Google Scholar
- 12.“Pressure to Rein in NSA Data Collection” Washington Post, March 25, 2015, P. A-6.Google Scholar
- 13.U.S.A. Freedom Act Passed, USA Today, June 2, 2015, http://www.usatoday.com/story/news/politics/2015/06/02/patriot-act-usa-freedom-act-senate-vote/28345747/.
- 14.Joseph N. Pelton, e-Sphere: The Rise of the World Wide Mind. (2000) Quorum Books, Westport, Connecticut.Google Scholar