You are on page 1of 11

Yang 1

Dayshia Yang CST 373 Spring 2014 March, 15 2014 My Thoughts on the Limits of Privacy Post 9/11

Privacy is about respecting the desires of individuals where compatible with the aims of the larger community. Privacy is not just about what people expect but about what they desire.

Yang 2 Privacy is not merely an individual right it is an important component of any flourishing community. - Daniel olove! "ornell #niversity $% According to Daniel Solo e, !ri acy is not only a need, "#t it is also a $ant that is all indi id#als sho#ld to ha e% !ri acy can "e de&ined as the state or condition o& "eing &ree &ro' "eing o"ser ed or dist#r"ed "y other people% ( eryone sho#ld ha e the right to their o$n pri ate #ses, seeing as pri acy is one o& the 'any things that is co ered "y o#r co#ntries )irst A'end'ent% There is an endless list o& the #ses o& the *nternet+ e erything &ro' ,#st e eryday #se o& social 'edia acco#nts, to doing research &or ho'e$or-, to send o#t e'ails, to $atching sho$s or 'o ies on .et&li/ or e en $atching pornography on their o$n co'p#ter #tili0es the internet in one $ay or another% 1o$e er, the internet has an internal trac-ing syste' $here no 'atter $hat sites are isited, there is recording o& $hat $ho #sed $hat $e"sites, ho$ &re2#ently they are ie$ed and co''on places isited% *t3s that internal trac-ing syste' that can "e seen as a threat to pri acy &or all #sers% ( eryone has a di&&erent identity and e eryone $ants their o$n pri acy% *n today3s society, e eryone is carrying aro#nd so'e &or' o& electronic de ice, s#ch as S'art phones, ta"lets, laptops, etc% and al'ost all o& these de ices contain applications or apps that people #se daily% There are "an-ing apps that allo$ yo# to ie$ "an- "alances, personal apps that allo$ yo# to contact &riends and &a'ily and e en so'e schools ha e apps% These apps hold tons o& personal in&or'ation that, i& &o#nd and #sed, co#ld ,eopardi0e so'eone3s entire $ell "eing% Than-&#lly, a 'a,ority o& o#r ne$ technology has a loc- &eat#re that assists in sec#ring the de ice &ro' these -inds sec#rity "reaches% 1o$e er, $hether or not there is a passcode in the de ice, it still can "e hac-ed and people3s personal and pri ate in&or'ation can "e ta-en and #sed $itho#t per'ission% This -ind o& personal in&or'ation &ra#d is also -no$n as identity the&t%

Yang 3 4*dentity the&t 5or identity &ra#d6 incl#des a range o& cri'es perpetrated against indi id#als, de&ined "roadly as 7the 'is#se o& personal identi&ying in&or'ation to co''it ario#s types o& &inancial &ra#d385(t0ioni 109:10;6% *dentity the&t strips people o& their personal rights to pri acy and allo$s &or their personal in&or'ation to "e #sed at $ill "y others% This &or' o& hac-ing is one o& the $orst and 'ost detri'ental to pri acy, especially to indi id#al pri acy% 1o$e er, this is only one o& the 'any $ays that the internet can "e hac-ed, 'eaning that the pri acy o& a 'a,ority o& people is on the line% !eople rely on the *nternet to pro ide in&or'ation, to store in&or'ation, to #se &or online "an-ing, etc% The #se o& *nternet can "e accessed $irelessly no$adays #sing <i:)i, $hether it "e in:ho'e or at a local Star"#c-s% Accessing the *nternet in: ho'e can "e the sa&est, "#t is any$here really sa&e= The <e" can "e hac-ed into and occ#rrences, s#ch as identity the&t can happen, $hether yo# 'ay -no$ it or not% *n Analisa .a0areno3s article, the C(> o& *DThe&tSec#rity%co', she states ?The speed o& technology has &ar o#tpaced the sec#rity o& the technology%? <hile $e are in the technology age, $ith o#r tech contin#o#sly changing and adapting, it3s hard to -eep #p $ith all the sec#rity that is needed on these de ices to ens#re the pri acy o& all prod#ct #sers and cons#'ers re'ains sa&e and protected% The iss#es o& pri acy "reaches are not only on de ices% ( en i& the pro"le' is not the physical de ice, there are the pri acy "reaches that occ#r on the <e"% *n a case, Do#"leClic-: an ad ertising ser ices co'pany: $as s#ed &or #nla$&#lly o"taining and selling cons#'ers3 pri ate in&or'ation% Thro#gh ass#'ed in&or'ation technology, -no$n as coo-ies, Do#"leClic- $as a"le to ta-e the in&or'ation that they recei ed to sell in&or'ation to other ad ertising co'panies to increase the co'pany3s a"ility to target their 'ar-ets, sell and e/pand their cons#'er "ase% *n the case, Do#"leClic-3s4@ne$ pri acy policy states that the co'pany plans to #se the in&or'ation collected "y coo-ies to "#ild a data"ase pro&iling cons#'ers8

Yang 4 51arding 20016% This pri acy policy itsel& can "e seen as a "reach o& indi id#al pri acy, "#t ar coo-ies the'sel es an in&ringe'ent o& one3s pri acy rights= The types o& coo-ies yo# can enco#nter on the $e" are not the sa'e that yo# can dip in 'il-% Coo-ies are s'all data &iles in the <e" "ro$sers that are #sed to re'e'"er $ho yo# are in order &or yo# to not "e treated as a ne$ #ser $hen isiting the sa'e pages again 5Aesdan#n 20056 *n 1;;4, Bo# Mont#lli $as hired at Mosaic Co''#nications Corporations, $hat is no$ .etscape 5Mont#lli 20136% *t $as then, $hen coo-ies $ere introd#ced in the $e"% 4*C' largely to "la'e &or se eral inno ations on the $e" incl#ding, coo-ies@8 5Mont#lli 20136% To contradict Mont#lli, a pro&essor at Stan&ord Ba$ School $ho st#dies the $ays so&t$are code and p#"lic policy college states that 4De&ore coo-ies, the <e" $as essentially pri ate% A&ter coo-ies, the <e" "eco'es a space o& capa"le e/traordinary 'onitoring8 5Sch$art0 20016% *t is this 'onitoring that "eco'es an ite' o& concern &or 'any% Mont#lli had created coo-ies &or the reason that there needed to "e 4The #ses o& 4'e'ory8 on a $e"site@8 s#ch as 4@shopping carts &or shopping, personali0ed content, logging in, and 'any other interacti e &eat#res re2#ire 'e'ory8 5Mont#lli 20136% 1o$e er, 4so'e "elie e that coo-ies are a sec#rity ris-, an in asion o& pri acy, and dangero#s to the *nternet8 51arding 2001%6 *nternet coo-ies contradicts pri acy #se on the <e"% >ne o& the largest shi&ts in pri acy that has happened in the past 10 years is the !atriot Act% The !atriot Act ca'e into e&&ect a&ter the ;E11 attac-s and $e still see the resid#al e&&ects o& this act today% The )inancial Cri'es (n&orce'ent .et$or- states 4The p#rpose o& the FSA !ATG*>T Act is to deter and p#nish terrorist acts in the Fnited States and aro#nd the $orld, to enhance la$ en&orce'ent in estigatory tools, and other p#rposes8% The !atriot Act does this thro#gh 'onitoring the ario#s &or's o& co''#nication that $e ha e here in A'erica, screening

Yang 5 &or threats against o#r co#ntry% There has "een criticis' $ith this, ho$e er, saying that this constant in&iltration o& ci ilians daily acti ities can "e seen as intr#si e and #n$arranted% Threats to o#r co#ntry ha e "een trac-ed in a ariety o& $ays since the enact'ent o& the !atriot Act% >ne o& the 'any $ays threats ha e &o#nd their $ay in and o#t o& the syste' #nnoticed $as thro#gh encryption% &ncryption can ma'e it impossible to obtain necessary evidence. &ncryption can frustrate communications intercepts that reveal valuable information about the intentions! plans! and membership of criminal organi(ations and generate leads for criminal investigations. &ncryption can frustrate antiterrorism efforts. &ncryption can hinder the gathering of intelligence. &ncryption! oddly enough! may lead to greater violations of privacy than otherwise have occurred5(t0ioni 79:906.The !atriot Act $o#ld help e en $ith things s#ch as encryption, on the "asis that this $o#ld allo$ a ariety o& technological de ices to "e encrypted $ith a speci&ic code, #ni2#e to the F%S% Ho ern'ent+ one that only co#ld "e accessed "y the go ern'ent% The iss#e $ith this is, ho$ &ar $ill this go and ho$ '#ch in&or'ation $ill "e at the disposal o& the F%S% Ho ern'ent% <hile the past t$enty:t$o years o& 'y li&e $ere going "y, the #se o& the *nternet and de elop'ents o& <e" accessi"le de ices $ere e ol ing rapidly% * re'e'"er ha ing Dial:#p *nternet $hich $as annoying &or 'ysel& and &or 'y 'o'% <hene er she needed to #se the phone, * had to get o&& the <e"% .o$ $ith the , * can access it in the pal' o& 'y hands on 'y s'artphone, a Hala/y S3% 1a ing that opport#nity to ha e 'y o$n roo' did allo$ 'e to ha e the e/perience to ta-e $ith 'e to college% My &irst year o& college, * did ha e roo''ates, "#t they $ere rarely there d#ring the day, so it $as as i& * still did ha e 'y o$n roo'% * $as al$ays in 'y roo', "#t then * decided to sociali0e and started hanging o#t $ith 'y &riends% The #pside o& ha ing 'y

Yang 6 o$n space, * co#ld do $hate er * $anted to, "#t the do$nside $as not e/periencing the social li&e and "eing st#c- on 'y co'p#ter% Co'p#ters $ere "ig $hen * $as yo#ng and no$ they are 'ore porta"le and s'aller in si0e% Also, there are so 'any ne$ technology things, s#ch as s'art $atches% .ot only are they porta"le, there is easy access to the *nternet% There is no 'ore dial:#p, "#t hot:spots, $i:&i, and data plans% * #sed not -no$ or cared a"o#t 'y *nternet accessi"le de ices% Deca#se o& the <e", 'y &a'ily does -no$ 'ore and -eeps #p $ith 'y li&e thro#gh social 'edia, li-e )ace"oo- and *nstagra'% Bi ing $ith 'y &riends in 'y college li&e is great and there is a "alance o& social interaction $ith people along $ith social 'edia% S'artphones, laptops, ta"lets are $hat there is no$% Deing eight years old then and no$ t$enty:t$o, the technology has changed% ( erything needs in&or'ation% *nstalling CD ga'es did not need s#ch in&or'ation li-e na'e, e:'ail, contact n#'"er, etc% ( erything can "e &o#nd on the <e" no$% Fsing the <e" consists o& things, s#ch as coo-ies% Coo-ies trac-s $hat sites ha e "een isited 'ostly or sa es in&or'ation% <hen * $as eight, coo-ies $ere ,#st those treats that * ate "eca#se * had a s$eet tooth% !apers can "e $ritten online no$ thro#gh Hoogle Docs and not ,#st speci&ically Microso&t <ord or .otepad% !eople can con ersate across the $orld no$ ,#st $ith a clic-% * &eel that there isn3t any'ore pri acy "eca#se $hate er $e do, 4Dig Drother8 is $atching% <ith all the de ices $e ha e, it can "e trac-ed i& $anted and $e can "e trac-ed% Also, there are greater chances o& ha ing identities stolen% Social 'edia is an addiction and $e p#t o#rsel es o#t there "eca#se 4e eryone else is doing it, so $hy not ,oin8= .e$spapers and 'aga0ine can "e read online and ne$s can "e $atched online% Many things needs log:in in&or'ation, 'eaning $e need to create acco#nts and gi e o#r in&or'ation% There are

Yang 7 applications &or "an-s, ga'es, ne$s, etc% that needs o#r in&or'ation% Ad ance'ents are great, "#t o#r identities are not so pri ate any'ore% Det$een 'y parents3 generation and 'y generation, there is a large gap $ith the technological $ord% My grandparents3 generation is o#t o& the 2#estion "eca#se they "arely e en -no$ ho$ to #se the landline in 'y ho#se% My &ather does not li-e #sing the <e", nor does he $ant to learn ho$ to% <ith papers, li-e old "ill state'ents, he does not li-e to ,#st trash the'% 1e li-es to shred the papers and then "#rn the'% My 'o' on the other hand, does $ant to learn ho$ to #se the <e"% She -no$s the "asics, s#ch as #sing )ace"oo- and accessing online "an-ing% D#t i& yo# $ere to as- her delete the history, "loc- #n$anted coo-ies, etc%, she $o#ld not -no$ $hat to do% My 'o' does not -no$ ho$ online pri acy $or-s as $ell% She 'ay enter so'e rando' sites and then ha e the co'p#ter "e "lo$n #p o& ads, or there $o#ld "e 'assi e a'o#nt o& spa' e'ails in her in"o/ "eca#se o& p#tting her e'ail in&or'ation o#t on the <e"% Three generations li ing in a ho#se and it is the third generation that has gro$n to adapt to the 2#ic- de elop'ents o& the <e"% There are 'ore de elop'ents e eryday and $ith 'ore de elop'ents, 'eans there sho#ld "e 'ore a$areness o& pri acy iss#es% *n the Fnited Iingdo', it is si'ilar to the Fnited States pri acy policies% The Fnited Iingdo' &ollo$s si'ilarly $ith the FSA !atriot Act% According to Dep#ty !ri'e Minister, .icClegg, 4since ;E11 $e ha e seen serio#s atte'pts at 'a,or acts o& terroris' in Dritain typically once or t$ice a year%8 *t is not ,#st terroris', "#t 4they incl#de the dangers posed "y rog#e and &ailing states, n#clear proli&eration, transnational serio#s and organised cri'e, and cy"ercri'e8 5Clegg6% There are all sorts o& cri'e that happens o er the #se o& *nternet% <ithin the 'ail ser ices and $e" #se, it is clear that in the Fnited Iingdo', 4*nternet &ir's $ill "e re2#ired to gi e intelligence agency HC1J access to co''#nications on de'and, in real ti'e8 5DDC6% A#st

Yang 8 li-e the Fnited States, there is 4Dig Drother8 $atching e eryone3s e ery 'o e and there $ill still "e the respect o& pri acy% *n So#th Iorea, according to (lectronista, a&ter the incident $ith 4hac-ers "reaching one o& So#th Iorea3s 'ost pop#lar <e" portals and stealing personal in&or'ation &ro' o er 35 'illion #sers incl#ding their na'e, address, phone n#'"er, and their resident registration n#'"er,8 there is a ne$ policy% That $as t$o:thirds o& the Iorean pop#lation% The real:na'e policy re2#ired <e"sites that reached o er 100,000 #sers to a#thenticate their identities 5(lectronista6% *n si'ilarity, to the Fnited States, $hen it as-s to con&ir' the access, the $e"site gi es yo# the 2#estions yo# chose to ans$er $hen yo# &irst signed #p, li-e 4<hat is yo#r 'other3s 'aiden na'e=8 or 4<hat is yo#r "est &riend3s na'e=8 The sec#rity 2#estions are there to a#thenticate access% According to S#tter, So#th Iorea has &aster internet speed than the Fnited States% Mean$hile the FS pays a"o#t K50 a 'onth on a erage, So#th Iorea only pays hal& that price &or a &aster connection 5S#tter6% ( ery 'onth, the "ill &ro' 'y internet pro ider, ATLT, is at least KM5 and the speed is not as &ast as * $ant it to "e e en tho#gh the plan incl#ded &aster speed% <hile the Fnited Iingdo' and So#th Iorea has si'ilarities $ith *nternet #sage and pri acy iss#es, Dra0il $ants to separate itsel& &ro' the FS Ho ern'ent% *t is 4a 'o e that 'any e/perts &ear $ill "e a potentially dangero#s &irst step to$ard politically &ract#ring a glo"al net$or- "#ilt $ith 'ini'al inter&erence "y go ern'ents8 5The 1ind#6% The reason that Dra0il $ants to depart &ro' FS do'inion is that $hen 4%%%FS .ational Sec#rity Agency intercepted her co''#nications, hac-ed into the state:o$ned !etro"ras oil co'pany3s net$or- and spied on Dra0ilians $ho entr#sted their personal data to FS tech co'panies s#ch as )ace"oo- and Hoogle8 5The 1ind#6% *& Dra0il entr#sted the'sel es in the FS and then only to &ind o#t the FS

Yang 9 is in ading their pri acy and spying on the', only 'a-es the the .SA and FS loo- "ad% !ri acy is a concern to e eryone e ery$here% *t has al$ays "een an iss#e since the <e" has started% The e ol#tion o& the *nternet is still de eloping and there $ill "e 'ore ad ance'ent in de ices there are no$ that $ill "e a"le to access the <e"% !ri acy iss#es $ill increase along $ith the e ol#tion% The FSA !atriot Act did co'e a&ter ;E11, "#t it only $or-s to an e/tent% <ith acts li-e these, A'erica3s stance on pri acy co'pared to other co#ntries $ill contin#e to di&&er%

Yang 10

Resources DDC% 52012, April 16% &mail and web use )to be monitored) under new laws% Getrie ed &ro' httpNEE$$$%""c%co'Ene$sE#-:politics:1757M745 Clegg, .% 52014, March 46% ecurity and privacy in the internet age% Getrie ed &ro' httpsNEE$$$%go %#-Ego ern'entEspeechesEsec#rity:and:pri acy:in:the:internet:age (lectronista .e$s% 52011, A#g#st 116% outh 'orea dropping real-name policy after privacy breach read more* httpNEE$$$%electronista%co'EarticlesE11E09E12Ecy"er%ids%o&%2%3%-orean%pop#lation%p#t%at%ris-E (t0ioni, A% 51;;;6% %he +imits of Privacy% .e$ Yor-, .YN Dasic Doo-s% )inancial Cri'es (n&orce'ent .et$or-s, 520016% # , Patriot ,ct% Getrie ed &ro' $e"siteN httpNEE$$$%&incen%go Estat#tesOregsEpatriotE 1arding, <% B% 520016% "oo'ies and -eb .ugs * -hat %hey ,re and /ow %hey -or' %ogether. $nformation ystems 0anagement, 12536, 17% Aesdan#n, A% 52005, A#g 146% <hat are coo-ies, and are they dangero#s= 3cala tar - .anner% Getrie ed &ro' httpNEEsearch%pro2#est%co'Edoc ie$E3;03MM7;9=acco#ntidP10355 Mont#lli, Bo# 520136% %he reasoning behind -eb "oo'ies. Getrie ed &ro' httpNEE$$$%'ont#lli:"log%co'E2013E05Ethe:reasoning:"ehind:$e":coo-ies%ht'l .a0areno, A% 520116% 1o$ &ree $i:&i can p#t yo# at ris-% Getrie ed &ro' httpNEE'oney%'sn%co'Eidentity:the&tEho$:&ree:$i:&i:can:p#t:yo#:at:ris-:credit:cards%asp/ Solo e, Daniel% 52011, May 176% -or'ing Definition of Privacy% Cornell Fni ersity *T% Getrie ed &ro' httpNEE$$$%it%cornell%ed#EpoliciesEin&opri acyEde&inition%c&' S#tter, A% D% 52010, March 316% -hy internet connections are fastest in south 'orea% Getrie ed &ro' httpNEE$$$%cnn%co'E2010ET(C1E03E31E"road"and%so#th%-oreaE The 1ind#% 52010, Septe'"er 176% .ra(il plans to go offline from us-centric internet% Getrie ed &ro' httpNEE$$$%thehind#%co'Ene$sEinternationalE$orldE"ra0il:plans:to:go:o&&line:&ro': #scentric:internetEarticle5137M9;%ece

Yang 11

You might also like