Advertisement

Is Anyone Looking Out for You? Your Government? Businesses Where You Trade? Your Neighbor? or Just Yourself?

Chapter
  • 1.1k Downloads

Abstract

As never before there is a dynamic tension in the modern world. In democratic societies there is an assumed, but not really explicitly stated, right to privacy by individual citizens in how they think, vote, and act within the laws. Yet in a world that is increasingly threatened by terrorism—including cyber-terrorism—governments have become increasingly intrusive into citizen’s privacy. Modern telecommunications and digital networks can be monitored, and increasingly governmental security agencies are invading the privacy of individuals. This is a dynamic balance that shifted after the 9/11 attacks on the United States and fears about Level 3 cyber-attacks on critical national infrastructure. This chapter examines the conflict between privacy and security and how it is being addressed in the United States and around the world.

Keywords

Credit Card Internet Protocol Address Social Security Agency Telecommunication Carrier Advance Persistent Threat 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Tom Risen, “FISA Judge Denies Surveillance Court Offers ‘Rubber Stamp’: Surveillance Court and NSA face scrutiny on email address collection” U.S. News & World Report, October 16, 2013 http://www.usnews.com/news/articles/2013/10/16/fisa-judge-denies-surveillance-court-offers-rubber-stamp.
  2. 2.
    Lichtblau, Eric (July 6, 2013), "In Secret, Court Vastly Broadens Powers of N.S.A." The New York Times. Retrieved July 9, 2013.Google Scholar
  3. 3.
    Alison Smale, “Anger Growing Among Allies on U.S. Spying” The New York Times, Oct. 23, 2013. http://www.nytimes.com/2013/10/24/world/europe/united-states-disputes-reports-of-wiretapping-in-Europe.html?_r=0.
  4. 4.
    David Meyer, “UK terror law amendments would bring back ‘Snooper’s Charter.’” Jan. 22, 2015. https://gigaom.com/2015/01/22/uk-terror-law-amendments-would-bring-back-snoopers-charter/.
  5. 5.
    “Europe’s Cyber Security Policy Settings Under Attack” Space Daily, May 4, 2014. http://www.spacedaily.com/reports/Europes_cybersecurity_policy_settings_under_attack_999.html.
  6. 6.
    Keven Bankston, “West Coast vs. East Coast: The crypto cold war between the feds and the tech industry just got hot.” Slate, February 25, 2015. http://www.slate.com/articles/technology/future_tense/2015/02/yahoo_s_alex_stamos_and_nsa_s_mike_rogers_fight_about_encryption.html.
  7. 7.
  8. 8.
    James Bamford, “NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” Wired, March 15, 2012. http://www.wired.com/2012/03/ff_nsadatacenter/.
  9. 9.
    Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts, White House Press release, Jan. 13, 2015. https://www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislation.
  10. 10.
    Where to get PGP(Pretty Good Privacy). www.cryptography.org/getpgp.htm.
  11. 11.
    Ellen Nakashima “Congress Gets Moving on Long-Sought Cyber Bill” Washington Post, March 25, 2015 P. A-6.Google Scholar
  12. 12.
    “Pressure to Rein in NSA Data Collection” Washington Post, March 25, 2015, P. A-6.Google Scholar
  13. 13.
  14. 14.
    Joseph N. Pelton, e-Sphere: The Rise of the World Wide Mind. (2000) Quorum Books, Westport, Connecticut.Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Executive Board International Association for the Advancement of Space SafetySpace and Advanced Communications Research InstituteArlingtonUSA
  2. 2.LATA’s Global Institute for Security TrainingLos Alamos Technical AssociatesMcLeanUSA

Personalised recommendations