This website uses cookies to ensure you have the best experience. Learn more

Protection Vs. Privacy Essay

5434 words - 22 pages

Protection vs. Privacy

In September of 2001, the worst terrorist tragedy that has ever occurred on American soil, and quite possibly in the world, rocked the foundations of the United States of America. The unimpeded destruction of the twin towers of the World Trade Center led many to wonder how an event of such magnitude could not have been foreseen and prevented. Later, many sources led us to believe that it was not that the information was not there, but rather, it was the inability of intelligence communities and law enforcement agencies to communicate the data among themselves that resulted in the greatest security breach in American history. To combat this inability to coordinate use of data and information, the Defense Advanced Research Projects Agency (DARPA) developed a new brainchild, the Total Information Awareness (TIA) Program. The uniqueness of the TIA program is that it uses advanced computer data collection, sharing, and mining technologies to attempt to forewarn against terrorism by spotting patterns in people's behaviors and activities that resemble the actions of former terrorists. As one can imagine, there are numerous proponents and opponents for and against the TIA program. One of the main challengers of the program is the American Civil Liberties Union (ACLU) which has raised numerous issues regarding the effect the TIA program will have on our fundamental American right to privacy. The question that is raised is, can preemptive profiling systems provide additional levels of security to the public without jeopardizing personal privacy?

It is important first to understand exactly what DARPA's TIA Program is supposed to do and how it plans to perform these feats. First off, TIA is
[A]n experimental prototype system that consists of three parts – language translation technologies, data search and recognition technologies, and advanced collaborative and decision support tools... The research into data search and pattern recognition technologies is based on the idea that terrorist planning activities or a likely terrorist attack could be uncovered by searching for indications of terrorist activities in vast quantities of transaction data (DARPA 1).

In simple terms, TIA uses the information that already exists in a variety of databases across the globe, such as bank and credit records, library memberships, medical records, airline travel records, and databases belonging to local and foreign intelligence agencies, law enforcement agencies and many more, in an attempt to weed out terrorists through a "Virtual Dragnet" (ACLU 2). The three key elements, language translation technologies, data search and recognition technologies, and advanced collaborative and decision support tools, are the cornerstones of the TIA program and are what raise both hopes for the program’s ability to succeed and fears of the program’s ability to invade the privacy of every American citizen. It is crucial to understand the current limitations...

Find Another Essay On Protection vs. Privacy

Public or Private? Essay

1063 words - 5 pages numerous amounts of communal and technical issues that cause this to be an expanding concern, “many possible technical and legal mechanisms that have/are being/will be proposed to provide information protection and define acceptable uses of accumulated information, and protection over the flow and reuse of this information” (“Putting Privacy in Context -- An overview of the Concept of Privacy and of Current Technologies”). The current announcement

Protecting the Privacy of Individuals on the Internet

2641 words - 11 pages conflicting privacy laws and common PIA policies instituted by Canada, Australia, countries in the European Union and the United States, several observations arise. First, it seems that too many mechanisms operate on a national level, rather than a global one. We see this in the conflict between the adoption of comprehensive laws vs. sectoral laws. Second, the use of self-regulatory devices for the protection of online privacy is inadequate. Laws

legal and ethical

1165 words - 5 pages legal system governs this case and its legal repercussions? Eighthly, protection under fourth amendment to the US constitution which provides protection to citizens from unwarranted search and seizure was extended to the privacy of individuals in the famous Katz Vs. United States case. However, it provides a scope for intrusion on privacy based on consent of individuals. Most data mining today occurs in a legal vacuum outside the scope of the Fourth Amendment and without a statutory or regulatory framework. Also, US Supreme Court has exempted third party records from the ambit of protection of fourth amendment (Miller Vs. United States, 1976).

Security vs Privacy

771 words - 4 pages evidence strengthen the article there is still not enough evidence to make the whole article much stronger. This quote also weakens his article as well. That is because in the quote Obama only talks about security and protecting the soldier and spies. It has nothing to do about security beating privacy in terms of privacy vs security. Another evidence that weakens this paragraph is “So, why do majorities of the country express support for the

Employee Privacy

1140 words - 5 pages listen to or record a telephone conversation, or prohibit employers from using surveillance cameras without notifying workers that they are on camera or being taped. Some state constitutions contain explicit right to privacy clauses. According to the Duke Law & Technology Review (2001), "The constitutions of eight states explicitly protect privacy and offer greater protection of the rights of public employees than does the United States Constitution

Protect the Nation or Yourself?

2125 words - 9 pages What should a person care about more, the nation or the individual? If an individual wants privacy for his personal life instead of national security, that is providing himself with less protection. It is said that privacy is one of the cherished freedoms in our democracy. Everyone wants privacy in their life, but privacy can only go so far without having protection. National security is what keeps the United States safe. National security

Email Privacy

1587 words - 6 pages employees email" (Shanon,Rosenthal). Why do people assume that email is private? This assumption could seem reasonable, given that email can be accessed from a personal message service that requires a password to access, providing a false sense of confidentiality. Perhaps people who are familiar with the privacy protection of the U.S. mail system assume it applies to email as well. It is possible for someone to have a misconstrued faith in

Search and seizure

1162 words - 5 pages exceptions made when performing a search and seizure; it is “the reasonable basis for believing that a crime may have been committed and that evidence of the crime is present. (Cornell)” A reasonable expectation of privacy is protected only to a certain extent due to the trial case of Katz vs. United States 389 U.S. 347, 88 S. Ct. 507, 19 L. Ed. 2d 576 (1976). The presence of a police officer can sometimes be frightening to some individuals. Many

Law Enforcement Cameras an Invasion of Privacy

1291 words - 6 pages Corner': Protection or Invasion?" ABC News. ABC News Network, 29 July 2007. Web. 14 May 2014. Stanley, Jay. "Accountability vs. Privacy: The ACLU's Recommendations on Police Body Cameras." American Civil Liberties Union. N.p., 09 Oct. 2013. Web. 15 May 2014.

The Double Helix Possesses All: Privacy Issues in the US

2358 words - 9 pages been promoted under “the Bush administration as an act of privacy protection” (Byrne 37). However, the HIPAA contradicts the meaning of privacy for the act allows any government affiliated organization to seize medical records from any patient without his knowledge. Although medical records may benefit the government, the patient loses his privacy for he has “zero control over who sees his records” (Byrne 40). With HIPAA, the patient becomes

Internet Privacy

1805 words - 7 pages June 1997, Reno vs. ACLU, the Supreme Court ruled that online speech is entitled to the same First Amendment protection as printed speech. It is necessary for the battle for privacy to be fought on many fronts such as legal, political, and technological. The Internet presents many benefits in the lives of patrons. However, as it is seen, it may bring new threats to personal privacy. Any cyberspace users should be aware of the potential of the

Similar Essays

A Fingerprint Privacy Protection Schemes: A Review

642 words - 3 pages Most of the existing techniques make use of the key or token for the fingerprint privacy protection, which creates the inconvenience. They may also be open to attacks when both the key and the protected fingerprint are stolen. The work in [4] propose a biohashing approach in which the inner products between the user’s fingerprint features and a pseudorandom number is computed. The work in [5] propose to generate cancelable fingerprint

Megan’s Law: Protection Or Invasion Of Privacy

1166 words - 5 pages Megan’s Law: Protection or Invasion of Privacy The controversy over Megan’s Law has always been about the invasion of privacy of past sex offenders who must register with local authorities who make the information available to the public. There are different mediums of which the information is disclosed, the internet being a hot topic of the on-going argument. Megan’s Law was placed with the intentions of protecting communities from convicted

Privacy Protection Through A Code Of Conduct

935 words - 4 pages In an effort to develop a viable privacy culture within the organization, the first step to achieve the enhancement of a culture of privacy protection within the department would be to develop a code of conduct. Based on the reality that such a code, usually referred to as a code of ethics is seen to be the basis of any ethics program it would only be prudent to institute the development of the same as a starting point. Such a code of conduct

Privacy Protection Rights For Business And How They Are Effected

759 words - 4 pages Switzerland is a neutral country with a long history of privacy protection. This, coupled with the political stability of the country and its high technological level, are providing the ideal conditions to develop a company focused on protecting the communications of its customers. Marketing-wise all those points can be summed to gain an edge over the competition. Switzerland is also offering clear legal bases that should guarantee the