Government Access To Private Databases By Kathleen Isley and John D’Alessandro.

Slides:



Advertisements
Similar presentations
The right to privacy: should people have complete privacy, or should the state be able to investigate their private communication, or their employers?
Advertisements

SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Teaching American History: Moot Courts and Constitutional Concepts.
COPYRIGHT NOTICE: This presentation contains copyrighted and/ or trademarked material the use of which has not always been specifically authorized by.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
The Patriot ACt. Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.
USA PATRIOT ACT USA PATRIOT ACT
Little brother is watching you
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
6/23/ :43 PM Lecture 13: Evaluation James Hook CS 591: Introduction to Computer Security.
RFID: The Reward is Worth the Risk With Government Intervention By Alex Johnson.
Privacy & Personal Information -- Why do we care or do we?
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Drug Testing In Selection: Legal, Ethical and Privacy Issues Joanna Bonilla, Anthony Bordogna, Danielle Dow, Antoine Woods, Stephanie Brawley.
131 Privacy 2. DOJ Position “Visit DOJ's new website launched to educate Americans about how we are preserving.
Lisa Morales CIS * Online and offline purchase data * Supermarket savings cards * White pages * Surveys * Sweepstakes and contest entries *
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
The Investigation Process.  Remember that there is a lot of “stuff” that happens before a person is charged or even a trial thought of  Figure 12.1.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
What right do you have to keep your stuff private? How does this right change depending on whether you are home or at school? Does it change depending.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
By: Justin Cruz Engl Ms. Deezy. Government?  Government is supposed to protect us but who protects us from the government?  How much control should.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
DO NOW – Friday, December 6 What do you think “unreasonable” means? A man is seen walking into an apartment with a grey duffel bag. He is then seen coming.
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 10/30/2006 Social Implications Discussion 2 – Privacy.
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
CALL TO ORDER  Have you or someone you’ve known ever been searched by the police, legally or illegally?  What do you know about the rules that police.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
The Patriot Act Is Spying on US citizens Ethical?
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Fourth Amendment Search and Seizure Civil Liberties.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
CS154 Formal Languages and Computability Thaddeus Aid Department of Computer Science San Jose State University Spring 2016 Creative Commons Attribution-ShareAlike.
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Privacy and the Law.
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Surveillance in Society
Societal Issues in Computing (COMP466)
Forensics Week 7.
Government.
Fourth Amendment And Probable Cause.
Define the Problem Constant surveillance of citizens in our country
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
Computer Security Social Legal and Ethical issues
How does this Constitutional amendment protect Americans?
Arrest.
IT and Society Week 2: Privacy.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

Government Access To Private Databases By Kathleen Isley and John D’Alessandro

The National Security Agency Fighting against terrorism Fighting against terrorism Domestic Spying Program Domestic Spying Program Access to telecommunication companies’ databases allows for mass data mining of phone and internet logs without public knowledge Access to telecommunication companies’ databases allows for mass data mining of phone and internet logs without public knowledge

The Issue at hand… In light of the possible threat of terrorism, is the NSA’s use of the private data mining industry as a surveillance tool ethical?

What is Data-Mining Data mining is searching through phone calls, s, online postings, shopping receipts, financial transactions, and even instant messages in order to retrieve information on people. Data mining is searching through phone calls, s, online postings, shopping receipts, financial transactions, and even instant messages in order to retrieve information on people.

Data-Mining: Not a new theory It is not a recent trend for information to be stored and retrieved by large corporations and other types of organizations It is not a recent trend for information to be stored and retrieved by large corporations and other types of organizations Retailers, for example, mine data on customer interactions and purchase histories to determine promotions or in-store placement.” (High Stakes Data-Mining). Retailers, for example, mine data on customer interactions and purchase histories to determine promotions or in-store placement.” (High Stakes Data-Mining).

Data Mining Government is a top buyer of data mining programs (Harris) Government is a top buyer of data mining programs (Harris) In 2004 U.S. feeral agencies engaged in 199 data mining projects (Hoover) In 2004 U.S. feeral agencies engaged in 199 data mining projects (Hoover) 122 of which include personal information (Hoover) 122 of which include personal information (Hoover)

An Example: AT&T In January 2006 the Electronic Frontier Foundation filed a lawsuit against AT&T In January 2006 the Electronic Frontier Foundation filed a lawsuit against AT&T AT&T would not publicly deny or confirm AT&T would not publicly deny or confirm The lawsuit was dismissed in July The lawsuit was dismissed in July The information made public after it was leaked by an AT&T technician The information made public after it was leaked by an AT&T technician

On May 11 the USA Today reported that AT&T, Verizon Wireless, and Bellsouth had all agreed to submit phone logs to the NSA On May 11 the USA Today reported that AT&T, Verizon Wireless, and Bellsouth had all agreed to submit phone logs to the NSA Bellsouth and Verizon denied these claims but, AT&T did not Bellsouth and Verizon denied these claims but, AT&T did not Verizon would not comment on whether or not MCI had worked with the NSA Verizon would not comment on whether or not MCI had worked with the NSA In June members of the House and Senate intelligence committees confirmed that the NSA had compiled a massive database of domestic phone call records In June members of the House and Senate intelligence committees confirmed that the NSA had compiled a massive database of domestic phone call records However, it was not released what these records are used for, how they were complied, or if their use was legal However, it was not released what these records are used for, how they were complied, or if their use was legal

Advantages to Data Mining Can help stop monetary crimes such as money fraud and Identity theft. Can help stop monetary crimes such as money fraud and Identity theft. “Data-mining techniques regularly help investigators identify credit-card-fraud and money-laundering patterns.” (Big Brother 101) “Data-mining techniques regularly help investigators identify credit-card-fraud and money-laundering patterns.” (Big Brother 101)

Helps to catch criminals and terrorists without giving away critical information on innocent citizens. Helps to catch criminals and terrorists without giving away critical information on innocent citizens. Shopping records Shopping records Online sites visited Online sites visited Recipients of s and phone calls Recipients of s and phone calls

Violation of Privacy “Part of what we mean by privacy in the West is the ability to control access to our information (qtd. in “Internet brings ‘increasing bewilderment’ about concept of privacy”).” “Part of what we mean by privacy in the West is the ability to control access to our information (qtd. in “Internet brings ‘increasing bewilderment’ about concept of privacy”).” Privacy is not concretely defined or protected Privacy is not concretely defined or protected Expectations of privacy in the U.S. are higher than most countries Expectations of privacy in the U.S. are higher than most countries

Not as much privacy as you think A lot of information is already stored on each citizen anyways A lot of information is already stored on each citizen anyways These records include outgoing and incoming phone numbers, time stamps, and other information, such as whether the call had been forwarded, but not names. USA Today reported that AT&T, BellSouth, and Verizon gave the government access to call data records starting in late The ambitious goal, according to an unnamed source quoted by the paper, is to put "every call ever made" in the United States into the database.” (Hoover, InformationWeek) These records include outgoing and incoming phone numbers, time stamps, and other information, such as whether the call had been forwarded, but not names. USA Today reported that AT&T, BellSouth, and Verizon gave the government access to call data records starting in late The ambitious goal, according to an unnamed source quoted by the paper, is to put "every call ever made" in the United States into the database.” (Hoover, InformationWeek)

The U.S. Constitution The Fourth Amendment reads: The Fourth Amendment reads: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

Time for a change? Constitution has been amended 27 times. Constitution has been amended 27 times. No right to privacy granted in the constitution No right to privacy granted in the constitution Because the internet has changed so much, and is in constant change, we need laws to govern its uses and the people that are internet users. Because the internet has changed so much, and is in constant change, we need laws to govern its uses and the people that are internet users. Consumers and Users have never been promised privacy on the internet, especially when they are the ones giving their information away. Consumers and Users have never been promised privacy on the internet, especially when they are the ones giving their information away.

Not Effective Tendency to solve problems that already occurred Tendency to solve problems that already occurred There is no indication of what future terrorism will entail There is no indication of what future terrorism will entail Popular Science: “Predictive data mining to preempt terrorist activities hasn’t been publicly proven so far (Schachtman).” Popular Science: “Predictive data mining to preempt terrorist activities hasn’t been publicly proven so far (Schachtman).”

Things to consider… How much information can be extracted from phone record? How much information can be extracted from phone record? This is all of the information known, what else is going on? This is all of the information known, what else is going on? What other information could the government have access to? What other information could the government have access to? Will the government always be able to have all related lawsuits dropped? Will the government always be able to have all related lawsuits dropped? We must consider how this practice of the NSA could evolve in the future We must consider how this practice of the NSA could evolve in the future

Discussion Questions Imagine you are a worker at a factory and your friend has a health problem that is slightly affecting their performance at work, but could later on have a great effect on their performance. Your friend has decided not to tell the employer of the condition. In the following weeks, your employer learns of your friend’s condition through information such as shopping records, phone calls, and internet sites visited. Your friend in turn gets fired. Is this an ethical use of data mining? Is your friend’s condition personal business since it is affecting their work, or does the company have a right to know about the health condition? Imagine you are a worker at a factory and your friend has a health problem that is slightly affecting their performance at work, but could later on have a great effect on their performance. Your friend has decided not to tell the employer of the condition. In the following weeks, your employer learns of your friend’s condition through information such as shopping records, phone calls, and internet sites visited. Your friend in turn gets fired. Is this an ethical use of data mining? Is your friend’s condition personal business since it is affecting their work, or does the company have a right to know about the health condition?

Discussion Questions Companies have been tracking information on their customers and employees for years, long before the government had access to the information. For example, phone companies have tracked where and to whom calls have been placed. Is this an ethical act for the companies to record their customer’s activities, or is it the consumer’s private information that is being exploited? What makes this an ethical act or what makes this the customer’s private data? Why not the other way around? Companies have been tracking information on their customers and employees for years, long before the government had access to the information. For example, phone companies have tracked where and to whom calls have been placed. Is this an ethical act for the companies to record their customer’s activities, or is it the consumer’s private information that is being exploited? What makes this an ethical act or what makes this the customer’s private data? Why not the other way around?

Discussion Questions Recently in the news, you have seen many reports of possible terrorist threats avoided due to information received from data mining. While the government has claimed to have arrested many terrorists from credible information, many innocent people have also been detained an, in turn, set free, due to faulty information. Is the reward of catching possible terrorists worth the risk of detaining innocent American citizens? Recently in the news, you have seen many reports of possible terrorist threats avoided due to information received from data mining. While the government has claimed to have arrested many terrorists from credible information, many innocent people have also been detained an, in turn, set free, due to faulty information. Is the reward of catching possible terrorists worth the risk of detaining innocent American citizens?