Download presentation
Presentation is loading. Please wait.
1
Government Access To Private Databases By Kathleen Isley and John D’Alessandro
2
The National Security Agency Fighting against terrorism Fighting against terrorism Domestic Spying Program Domestic Spying Program Access to telecommunication companies’ databases allows for mass data mining of phone and internet logs without public knowledge Access to telecommunication companies’ databases allows for mass data mining of phone and internet logs without public knowledge
3
The Issue at hand… In light of the possible threat of terrorism, is the NSA’s use of the private data mining industry as a surveillance tool ethical?
4
What is Data-Mining Data mining is searching through phone calls, emails, online postings, shopping receipts, financial transactions, and even instant messages in order to retrieve information on people. Data mining is searching through phone calls, emails, online postings, shopping receipts, financial transactions, and even instant messages in order to retrieve information on people.
5
Data-Mining: Not a new theory It is not a recent trend for information to be stored and retrieved by large corporations and other types of organizations It is not a recent trend for information to be stored and retrieved by large corporations and other types of organizations Retailers, for example, mine data on customer interactions and purchase histories to determine promotions or in-store placement.” (High Stakes Data-Mining). Retailers, for example, mine data on customer interactions and purchase histories to determine promotions or in-store placement.” (High Stakes Data-Mining).
6
Data Mining Government is a top buyer of data mining programs (Harris) Government is a top buyer of data mining programs (Harris) In 2004 U.S. feeral agencies engaged in 199 data mining projects (Hoover) In 2004 U.S. feeral agencies engaged in 199 data mining projects (Hoover) 122 of which include personal information (Hoover) 122 of which include personal information (Hoover)
7
An Example: AT&T In January 2006 the Electronic Frontier Foundation filed a lawsuit against AT&T In January 2006 the Electronic Frontier Foundation filed a lawsuit against AT&T AT&T would not publicly deny or confirm AT&T would not publicly deny or confirm The lawsuit was dismissed in July The lawsuit was dismissed in July The information made public after it was leaked by an AT&T technician The information made public after it was leaked by an AT&T technician
8
On May 11 the USA Today reported that AT&T, Verizon Wireless, and Bellsouth had all agreed to submit phone logs to the NSA On May 11 the USA Today reported that AT&T, Verizon Wireless, and Bellsouth had all agreed to submit phone logs to the NSA Bellsouth and Verizon denied these claims but, AT&T did not Bellsouth and Verizon denied these claims but, AT&T did not Verizon would not comment on whether or not MCI had worked with the NSA Verizon would not comment on whether or not MCI had worked with the NSA In June members of the House and Senate intelligence committees confirmed that the NSA had compiled a massive database of domestic phone call records In June members of the House and Senate intelligence committees confirmed that the NSA had compiled a massive database of domestic phone call records However, it was not released what these records are used for, how they were complied, or if their use was legal However, it was not released what these records are used for, how they were complied, or if their use was legal
9
Advantages to Data Mining Can help stop monetary crimes such as money fraud and Identity theft. Can help stop monetary crimes such as money fraud and Identity theft. “Data-mining techniques regularly help investigators identify credit-card-fraud and money-laundering patterns.” (Big Brother 101) “Data-mining techniques regularly help investigators identify credit-card-fraud and money-laundering patterns.” (Big Brother 101)
10
Helps to catch criminals and terrorists without giving away critical information on innocent citizens. Helps to catch criminals and terrorists without giving away critical information on innocent citizens. Shopping records Shopping records Online sites visited Online sites visited Recipients of emails and phone calls Recipients of emails and phone calls
11
Violation of Privacy “Part of what we mean by privacy in the West is the ability to control access to our information (qtd. in “Internet brings ‘increasing bewilderment’ about concept of privacy”).” “Part of what we mean by privacy in the West is the ability to control access to our information (qtd. in “Internet brings ‘increasing bewilderment’ about concept of privacy”).” Privacy is not concretely defined or protected Privacy is not concretely defined or protected Expectations of privacy in the U.S. are higher than most countries Expectations of privacy in the U.S. are higher than most countries
12
Not as much privacy as you think A lot of information is already stored on each citizen anyways A lot of information is already stored on each citizen anyways These records include outgoing and incoming phone numbers, time stamps, and other information, such as whether the call had been forwarded, but not names. USA Today reported that AT&T, BellSouth, and Verizon gave the government access to call data records starting in late 2001. The ambitious goal, according to an unnamed source quoted by the paper, is to put "every call ever made" in the United States into the database.” (Hoover, InformationWeek) These records include outgoing and incoming phone numbers, time stamps, and other information, such as whether the call had been forwarded, but not names. USA Today reported that AT&T, BellSouth, and Verizon gave the government access to call data records starting in late 2001. The ambitious goal, according to an unnamed source quoted by the paper, is to put "every call ever made" in the United States into the database.” (Hoover, InformationWeek)
13
The U.S. Constitution The Fourth Amendment reads: The Fourth Amendment reads: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
14
Time for a change? Constitution has been amended 27 times. Constitution has been amended 27 times. No right to privacy granted in the constitution No right to privacy granted in the constitution Because the internet has changed so much, and is in constant change, we need laws to govern its uses and the people that are internet users. Because the internet has changed so much, and is in constant change, we need laws to govern its uses and the people that are internet users. Consumers and Users have never been promised privacy on the internet, especially when they are the ones giving their information away. Consumers and Users have never been promised privacy on the internet, especially when they are the ones giving their information away.
15
Not Effective Tendency to solve problems that already occurred Tendency to solve problems that already occurred There is no indication of what future terrorism will entail There is no indication of what future terrorism will entail Popular Science: “Predictive data mining to preempt terrorist activities hasn’t been publicly proven so far (Schachtman).” Popular Science: “Predictive data mining to preempt terrorist activities hasn’t been publicly proven so far (Schachtman).”
16
Things to consider… How much information can be extracted from phone record? How much information can be extracted from phone record? This is all of the information known, what else is going on? This is all of the information known, what else is going on? What other information could the government have access to? What other information could the government have access to? Will the government always be able to have all related lawsuits dropped? Will the government always be able to have all related lawsuits dropped? We must consider how this practice of the NSA could evolve in the future We must consider how this practice of the NSA could evolve in the future
17
Discussion Questions Imagine you are a worker at a factory and your friend has a health problem that is slightly affecting their performance at work, but could later on have a great effect on their performance. Your friend has decided not to tell the employer of the condition. In the following weeks, your employer learns of your friend’s condition through information such as shopping records, phone calls, and internet sites visited. Your friend in turn gets fired. Is this an ethical use of data mining? Is your friend’s condition personal business since it is affecting their work, or does the company have a right to know about the health condition? Imagine you are a worker at a factory and your friend has a health problem that is slightly affecting their performance at work, but could later on have a great effect on their performance. Your friend has decided not to tell the employer of the condition. In the following weeks, your employer learns of your friend’s condition through information such as shopping records, phone calls, and internet sites visited. Your friend in turn gets fired. Is this an ethical use of data mining? Is your friend’s condition personal business since it is affecting their work, or does the company have a right to know about the health condition?
18
Discussion Questions Companies have been tracking information on their customers and employees for years, long before the government had access to the information. For example, phone companies have tracked where and to whom calls have been placed. Is this an ethical act for the companies to record their customer’s activities, or is it the consumer’s private information that is being exploited? What makes this an ethical act or what makes this the customer’s private data? Why not the other way around? Companies have been tracking information on their customers and employees for years, long before the government had access to the information. For example, phone companies have tracked where and to whom calls have been placed. Is this an ethical act for the companies to record their customer’s activities, or is it the consumer’s private information that is being exploited? What makes this an ethical act or what makes this the customer’s private data? Why not the other way around?
19
Discussion Questions Recently in the news, you have seen many reports of possible terrorist threats avoided due to information received from data mining. While the government has claimed to have arrested many terrorists from credible information, many innocent people have also been detained an, in turn, set free, due to faulty information. Is the reward of catching possible terrorists worth the risk of detaining innocent American citizens? Recently in the news, you have seen many reports of possible terrorist threats avoided due to information received from data mining. While the government has claimed to have arrested many terrorists from credible information, many innocent people have also been detained an, in turn, set free, due to faulty information. Is the reward of catching possible terrorists worth the risk of detaining innocent American citizens?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.