Protection Vs. Privacy Essay

5434 words - 22 pages

Protection vs. Privacy

In September of 2001, the worst terrorist tragedy that has ever occurred on American soil, and quite possibly in the world, rocked the foundations of the United States of America. The unimpeded destruction of the twin towers of the World Trade Center led many to wonder how an event of such magnitude could not have been foreseen and prevented. Later, many sources led us to believe that it was not that the information was not there, but rather, it was the inability of intelligence communities and law enforcement agencies to communicate the data among themselves that resulted in the greatest security breach in American history. To combat this inability to coordinate use of data and information, the Defense Advanced Research Projects Agency (DARPA) developed a new brainchild, the Total Information Awareness (TIA) Program. The uniqueness of the TIA program is that it uses advanced computer data collection, sharing, and mining technologies to attempt to forewarn against terrorism by spotting patterns in people's behaviors and activities that resemble the actions of former terrorists. As one can imagine, there are numerous proponents and opponents for and against the TIA program. One of the main challengers of the program is the American Civil Liberties Union (ACLU) which has raised numerous issues regarding the effect the TIA program will have on our fundamental American right to privacy. The question that is raised is, can preemptive profiling systems provide additional levels of security to the public without jeopardizing personal privacy?

It is important first to understand exactly what DARPA's TIA Program is supposed to do and how it plans to perform these feats. First off, TIA is
[A]n experimental prototype system that consists of three parts – language translation technologies, data search and recognition technologies, and advanced collaborative and decision support tools... The research into data search and pattern recognition technologies is based on the idea that terrorist planning activities or a likely terrorist attack could be uncovered by searching for indications of terrorist activities in vast quantities of transaction data (DARPA 1).

In simple terms, TIA uses the information that already exists in a variety of databases across the globe, such as bank and credit records, library memberships, medical records, airline travel records, and databases belonging to local and foreign intelligence agencies, law enforcement agencies and many more, in an attempt to weed out terrorists through a "Virtual Dragnet" (ACLU 2). The three key elements, language translation technologies, data search and recognition technologies, and advanced collaborative and decision support tools, are the cornerstones of the TIA program and are what raise both hopes for the program’s ability to succeed and fears of the program’s ability to invade the privacy of every American citizen. It is crucial to understand the current limitations...

Find Another Essay On Protection vs. Privacy

Employee Privacy Essay

1140 words - 5 pages listen to or record a telephone conversation, or prohibit employers from using surveillance cameras without notifying workers that they are on camera or being taped. Some state constitutions contain explicit right to privacy clauses. According to the Duke Law & Technology Review (2001), "The constitutions of eight states explicitly protect privacy and offer greater protection of the rights of public employees than does the United States Constitution

Protect the Nation or Yourself? Essay

2125 words - 9 pages What should a person care about more, the nation or the individual? If an individual wants privacy for his personal life instead of national security, that is providing himself with less protection. It is said that privacy is one of the cherished freedoms in our democracy. Everyone wants privacy in their life, but privacy can only go so far without having protection. National security is what keeps the United States safe. National security

Email Privacy

1587 words - 6 pages employees email" (Shanon,Rosenthal). Why do people assume that email is private? This assumption could seem reasonable, given that email can be accessed from a personal message service that requires a password to access, providing a false sense of confidentiality. Perhaps people who are familiar with the privacy protection of the U.S. mail system assume it applies to email as well. It is possible for someone to have a misconstrued faith in

Search and seizure

1162 words - 5 pages exceptions made when performing a search and seizure; it is “the reasonable basis for believing that a crime may have been committed and that evidence of the crime is present. (Cornell)” A reasonable expectation of privacy is protected only to a certain extent due to the trial case of Katz vs. United States 389 U.S. 347, 88 S. Ct. 507, 19 L. Ed. 2d 576 (1976). The presence of a police officer can sometimes be frightening to some individuals. Many

The Double Helix Possesses All: Privacy Issues in the US

2358 words - 9 pages been promoted under “the Bush administration as an act of privacy protection” (Byrne 37). However, the HIPAA contradicts the meaning of privacy for the act allows any government affiliated organization to seize medical records from any patient without his knowledge. Although medical records may benefit the government, the patient loses his privacy for he has “zero control over who sees his records” (Byrne 40). With HIPAA, the patient becomes

Internet Privacy

1805 words - 7 pages June 1997, Reno vs. ACLU, the Supreme Court ruled that online speech is entitled to the same First Amendment protection as printed speech. It is necessary for the battle for privacy to be fought on many fronts such as legal, political, and technological. The Internet presents many benefits in the lives of patrons. However, as it is seen, it may bring new threats to personal privacy. Any cyberspace users should be aware of the potential of the


783 words - 3 pages ] - pursuit of positive experiences that make them happy [AUSTRALIA])Hierarchy vs. egalitarianismMastery vs. harmonyMastery: master, change and exploit natural/social environment for goals (values ambition, success, daring, competence)Harmony: understanding & fitting in with environment (unity with nature, protection of the world, world peace) (Norway)Tromoenaar's Dimensions of cultureUniversalism vs. particularismParticularist: circumstances &amp

Privacy in the Internet

2026 words - 8 pages “out there,” not all of it is accessible to any given person at any given time. Or is it? Currently, no explicit right to privacy in the U.S. Constitution is mentioned. In the case of Katz vs. U.S. (1967), it has been ruled that The Fourth Amendment provides us with a “reasonable expectation of privacy,” which means that the government must have a probable cause in order to legally monitor phone and electronic communications legally[1]. Johnson[2

Search and Seizure

6195 words - 25 pages democracy. It restores the feeling of pride in every person and reminds him that regardless of his sex, nationality or race, financial or economic status in life, he deserves to be respected because he is a human person. The right to privacy of private individuals against the state is well-settled. Not only the constitution but also the state and federal laws have provided for sufficient protection to private individuals against the acts of government

Internet Privacy and Security

1113 words - 5 pages the same in many ways. Browser security is protection against personal information or data being stolen from oneself to commit fraud, browser security helps us determine secure sites online vs unsafe sites. They are also the same because they share the responsibility along with us, to know how to use the internet appropriately, and safe guard us from viruses, internet stockers, hackers, etc. Privacy and Security are both equally important, to

Privacy vs. Security

2632 words - 11 pages Privacy vs. Security Introduction Pictures seen in homes across America and throughout the world of American symbols in flames and crashing a quarter mile to the ground changed the world forever. The world's last and only superpower had been attacked in a way only conceivable in a Hollywood script. However, the physical destruction that resulted was not necessarily the biggest loss that the United States faced. The emotional destruction

Similar Essays

Megan’s Law: Protection Or Invasion Of Privacy

1166 words - 5 pages Megan’s Law: Protection or Invasion of Privacy The controversy over Megan’s Law has always been about the invasion of privacy of past sex offenders who must register with local authorities who make the information available to the public. There are different mediums of which the information is disclosed, the internet being a hot topic of the on-going argument. Megan’s Law was placed with the intentions of protecting communities from convicted

Privacy Protection Through A Code Of Conduct

935 words - 4 pages In an effort to develop a viable privacy culture within the organization, the first step to achieve the enhancement of a culture of privacy protection within the department would be to develop a code of conduct. Based on the reality that such a code, usually referred to as a code of ethics is seen to be the basis of any ethics program it would only be prudent to institute the development of the same as a starting point. Such a code of conduct

Protecting The Privacy Of Individuals On The Internet

2641 words - 11 pages conflicting privacy laws and common PIA policies instituted by Canada, Australia, countries in the European Union and the United States, several observations arise. First, it seems that too many mechanisms operate on a national level, rather than a global one. We see this in the conflict between the adoption of comprehensive laws vs. sectoral laws. Second, the use of self-regulatory devices for the protection of online privacy is inadequate. Laws

Security Vs Privacy Essay

771 words - 4 pages evidence strengthen the article there is still not enough evidence to make the whole article much stronger. This quote also weakens his article as well. That is because in the quote Obama only talks about security and protecting the soldier and spies. It has nothing to do about security beating privacy in terms of privacy vs security. Another evidence that weakens this paragraph is “So, why do majorities of the country express support for the