Karen Cook: Technology Outspacing Constitution

764 views
690 views

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
764
On SlideShare
0
From Embeds
0
Number of Embeds
208
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Karen Cook: Technology Outspacing Constitution

    1. 1. TECHNOLOGY IS OUTPACING THE CONSTITUTION <ul><li>As Technologies evolve, shouldn’t the policies that protect us? </li></ul>
    2. 2. History <ul><li>American Constitution protects people from Search and Seizure without cause </li></ul><ul><ul><li>The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. </li></ul></ul><ul><li>Previous Case Law </li></ul><ul><ul><li>Changing technology changes search methods </li></ul></ul><ul><ul><ul><li>Olmstead vs U.S. </li></ul></ul></ul><ul><ul><ul><ul><li>Supreme court Upheld </li></ul></ul></ul></ul>
    3. 3. New Law <ul><li>What </li></ul><ul><ul><li>Patriot Act </li></ul></ul><ul><ul><li>Foreign Intelligence Surveillance Act </li></ul></ul><ul><li>Why </li></ul><ul><ul><li>Detection of Terrorists </li></ul></ul><ul><li>How </li></ul><ul><ul><li>National Security Agency Surveillance </li></ul></ul><ul><ul><ul><li>Dragnet </li></ul></ul></ul><ul><ul><ul><li>Semantic Web </li></ul></ul></ul><ul><ul><ul><li>Going through data on citizens that are not suspects </li></ul></ul></ul>
    4. 4. Internet Penetration in America Of the Total Population
    5. 5. Cell Phone Use <ul><li>Cell phone usage in the United states has grown from 340,213 in 1985 to 133,000,000 in 2006 </li></ul><ul><li>Year Subscribers </li></ul><ul><li>44,042,992 </li></ul><ul><li>1997 55,312,293 </li></ul><ul><li>1998 69,209,321 </li></ul><ul><li>1999 86,047,003 </li></ul><ul><li>2000 109,478,031 </li></ul><ul><li>2001 128,374,512 </li></ul><ul><li>2002 140,766,842 </li></ul><ul><li>2003 158,721,981 </li></ul><ul><li>2004 182,140,362 </li></ul><ul><li>2005 207,896,198 </li></ul><ul><li>2006 233,000,000 </li></ul>33,758,661 1995 24,134,421 1994 16,009,461 1993 11,032,753 1992 7,557,148 1991 5,283,055 1990 3,508,944 1989 2,069,441 1988 1,230,855 1987 681,825 1986 340,213 1985 Subscribers Year
    6. 6. GPS <ul><li>Not only used by emergency services </li></ul><ul><li>Can be identified even when the electronic is turn off </li></ul><ul><li>Found in more and more devices </li></ul>
    7. 7. Technology Growth <ul><li>Four Laws </li></ul><ul><ul><li>Moors Law </li></ul></ul><ul><ul><ul><li>Cost of a transistor on a semiconductor will be halved every 18 months </li></ul></ul></ul><ul><ul><li>Matcalfe’s Law </li></ul></ul><ul><ul><ul><li>Functionality of network will increase exponentially by per yearly usage </li></ul></ul></ul><ul><ul><li>Shugar’s Law </li></ul></ul><ul><ul><ul><li>Price per bit of magnetic storage halves every 18 months </li></ul></ul></ul><ul><ul><li>Gilder’s Law </li></ul></ul><ul><ul><ul><li>Price of transmitting a bit of data over the communication networks halved every 12 months. </li></ul></ul></ul><ul><li>Falling Cost = Increased Usage </li></ul><ul><ul><li>More Information More Available </li></ul></ul><ul><ul><ul><li>Banking, health, economic, any personal information </li></ul></ul></ul>
    8. 8. Searching Data (Semantic Web)
    9. 9. Searching Data (Dragnet) <ul><li>“The issue arises where the collection of data is not related or only remotely related, to law enforcement and is principally designed to inform the government about the political belief, attitudes or activities of individuals or organizations…. </li></ul><ul><ul><ul><ul><li>Thomas Emerson, Yale </li></ul></ul></ul></ul>
    10. 10. Thurgood Marshall <ul><li>“ History teaches that grave threats to liberty often come in times of urgency when constitutional rights seem too extravagant to endure. Yet when we allow fundamental freedoms to be sacrificed in the name of real or perceived exigency, we invariably come to regret it.” </li></ul>
    11. 11. Japanese American Internment Relocation WWII
    12. 12. Red Scare
    13. 13. Government Should Not Run the People The People Should Run the Government
    14. 14. Specific Legal Issues to be Addressed <ul><li>Governance of the Internet/Cellular Pone Usage/GPS systems </li></ul><ul><li>Technology and Surveillance </li></ul><ul><li>Data Protection </li></ul><ul><li>Supervision of Users </li></ul><ul><li>Computer/Cellular Phone/GPS Fraud and Hacking </li></ul><ul><li>The Nature of Software Monopoly (the Microsoft case) As well as for Cellular Phones and GPS services </li></ul><ul><li>Remedies for Technology Libel (slander) </li></ul>

    ×