SlideShare a Scribd company logo
1 of 9
Privacy and the
Government
A Balancing
Act
 Federal, state, and local governments in United States have had
significant impact on privacy of individuals
 Government must balance competing desires of citizens
 desire to be left alone
 desire for safety and security
 National security concerns increased significantly after 9/11
attacks
 Information collection: Activities that gather personal
information
 Information processing: Activities that store, manipulate, and use
personal information that has been collected
 Information dissemination: Activities that spread personal
information
 Invasion: Activities that intrude upon a person’s daily life,
interrupt someone’s solitude, or interfere with decision-making
Information
Collection by
the
Government
 Census Records
 Census required to ensure every state has fair representation
 Number of questions steadily rising
 IRS Records
 The 16th Amendment to the US Constitution gives the federal
government the power to collect an income tax
 IRS collects more than $2 trillion a year in income taxes
 FBI Crime Center
 NCIC
 Collection of databases related to various crimes
 Contains > 39 million records
 DOJ Database
 Gives state and local police officers access to information
provided by five federal law enforcement agencies
 Incident reports
 Interrogation summaries
 Question:What are some concerns with this type of information
collection?
The Difference
between
Convenience
andSafety
 Closed CircuitTelevision Cameras
 First use in Olean, NewYork in 1968
 Now more than 30 million cameras in US
 NewYork City’s effort in lower Manhattan
 $201 million for 3,000 new cameras
 License plate readers
 Radiation detectors
 Effectiveness of cameras debated
 Police Drones
 A few police departments in US operate small unmanned drones
 FAA puts restrictions on use
 Public opinion mixed
 Yes: Search and rescue
 No: Identify speeders
 Should police be required to get a
search warrant before surveillance
of a residence?
Covert
Government
Surveillance
 4th Amendment to the Constitution
 “The right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and
seizures, shall not be violated, and noWarrants shall issue,
but upon probable cause, supported by Oath or affirmation,
and particularly describing the place to be searched, and the
persons or things to be seized.”
 Wiretaps and Bugs
 Carnivore Surveillance System
 Post 9/11
 President Bush signed presidential order
 OK for NSA to intercept international phone calls &
emails initiated by people inside US
 No search warrant required
 Number of people monitored
 About 500 people inside US
 Another 5,000-7,000 people outside US
 Two al-Qaeda plots foiled
 Plot to take down Brooklyn bridge
 Plot to bomb British pubs and train stations
How Fear
DrivesUs
 The Patriot Act
 Provisions
 Greater authority to monitor communications
 Greater powers to regulate banks
 Greater border controls
 Critics say Act undermines 4th Amendment rights
 Pen registers on Web browsers
 Roving surveillance
 Searches and seizures without warrants
 Warrants issued without need for showing probable cause
 Success
 Charges against 361 individuals
 More than 500 people removed from United States
 Terrorist cells broken up in Buffalo, Seattle, Tampa, and Portland
 Failures
 March 11, 2004 bombings in Madrid Spain
 FBI makes Brandon Mayfield a suspect
 Claims partial fingerprint match
 Conducts electronic surveillance
 Enters home without revealing search warrant
 Copies documents and computer hard drives
 Spanish authorities match fingerprint with an Algerian
 Judge orders Mayfield released
 FBI apologizes
Data Mining
by the
Government
 Data mining: Process of searching through one or more databases looking for patterns or
relationships among the data
 IRS Audits
 IRS uses computer matching and data mining to look for possible income tax fraud
 Computer matching: matching tax form information with information provided by employers,
banks, etc.
 Data mining: searching through forms to detect those that appear most likely to have errors
resulting in underpayment of taxes
 Syndromic surveillance system:A data mining system that searches for patterns indicating the
outbreak of an epidemic or bioterrorism
 911 calls
 emergency room visits
 school absenteeism
 Internet searches
 Example: A system in NewYork City detected an
outbreak of a virus in 2002
 Telecommunications Records Database
 Created by National Security Agency after 9/11
 Contains phone call records of tens of millions ofAmericans
 NSA analyzing calling patterns to detect terrorist networks
 Phone records voluntarily provided by several major telecommunications companies
 Predictive Modeling
 Criminals behave in a predictable way
 Times of crimes fall into patterns
 Some areas have higher incidence of crimes
 Predictive policing: use of data mining to deploy police officers to areas where crimes are more
likely to occur
 Police in Santa Cruz and Los Angeles saw significant declines in property crime
Freedom of
Information
Act
 Federal law designed to ensure public has access to US
government records
 Signed by President Johnson (1966)
 Applies only to executive branch
 Nine exemptions
 Classified documents
 Trade secrets or financial information
 Documents related to law enforcement
investigations
Invasion of
Privacy
 Government actions to prevent invasion
 Do Not Call Registry
 FTC responded to public opinion
 Created Do Not Call Registry in 2003
 More than 50 million phone numbers registered before it even took affect
 Example of how privacy is treated as a prudential right
 Benefit of shielding people from telemarketers judged to be greater than
harm caused by limiting telephone advertising
 CALMAct
 Television watchers have complained to FCC about loud commercials since 1960s
 CALMAct signed by PresidentObama in 2010
 Requires FCC to ensure television commercials are played at same volume as
programs they are interrupting
 Invasive government actions
 Requiring identification for pseudoephedrine purchases
 Pseudoephedrine an ingredient of Sudafed and other cold medications
 It is also an ingredient of methamphetamine (“meth”)
 Federal and state governments have passed laws limiting access to pseudoephedrine
 Limits quantity that can be purchased in a month
 Identification and signature required for purchase in most states
 Advanced ImagingTechnology scanners at airports

More Related Content

What's hot

Freedom of Information Act and Open Meetings Reseach Paper
Freedom of Information Act and Open Meetings Reseach PaperFreedom of Information Act and Open Meetings Reseach Paper
Freedom of Information Act and Open Meetings Reseach PaperNick Sizeland
 
The Security Era
The Security EraThe Security Era
The Security Erajk_welder
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillanceskimkiper
 
The rothschilds news followup
The rothschilds  news followupThe rothschilds  news followup
The rothschilds news followupAnonDownload
 
Letter to Governor Ige on Government Transparency
Letter to Governor Ige on Government TransparencyLetter to Governor Ige on Government Transparency
Letter to Governor Ige on Government TransparencyHonolulu Civil Beat
 
How to Make an IRS Freedom of Information (FOIA) Request?How to file a freedo...
How to Make an IRS Freedom of Information (FOIA) Request?How to file a freedo...How to Make an IRS Freedom of Information (FOIA) Request?How to file a freedo...
How to Make an IRS Freedom of Information (FOIA) Request?How to file a freedo...James J. Grennen
 
SB 1070 vs. Genocide
SB 1070 vs. GenocideSB 1070 vs. Genocide
SB 1070 vs. Genocidebecause789
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgetrupassion
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 
Rachels Law Abmpegasus
Rachels Law AbmpegasusRachels Law Abmpegasus
Rachels Law AbmpegasusDawnStarling
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
 
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...Atmos
 
Intelligence chief defends internet spying program
Intelligence chief defends internet spying programIntelligence chief defends internet spying program
Intelligence chief defends internet spying programabiross34
 
Usa patriot act
Usa patriot actUsa patriot act
Usa patriot actesounds
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 

What's hot (19)

Freedom of Information Act and Open Meetings Reseach Paper
Freedom of Information Act and Open Meetings Reseach PaperFreedom of Information Act and Open Meetings Reseach Paper
Freedom of Information Act and Open Meetings Reseach Paper
 
The Security Era
The Security EraThe Security Era
The Security Era
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
The rothschilds news followup
The rothschilds  news followupThe rothschilds  news followup
The rothschilds news followup
 
Q&A about PRISM
Q&A about PRISMQ&A about PRISM
Q&A about PRISM
 
Letter to Governor Ige on Government Transparency
Letter to Governor Ige on Government TransparencyLetter to Governor Ige on Government Transparency
Letter to Governor Ige on Government Transparency
 
How to Make an IRS Freedom of Information (FOIA) Request?How to file a freedo...
How to Make an IRS Freedom of Information (FOIA) Request?How to file a freedo...How to Make an IRS Freedom of Information (FOIA) Request?How to file a freedo...
How to Make an IRS Freedom of Information (FOIA) Request?How to file a freedo...
 
SB 1070 vs. Genocide
SB 1070 vs. GenocideSB 1070 vs. Genocide
SB 1070 vs. Genocide
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledge
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
Turn It Back On
Turn It Back OnTurn It Back On
Turn It Back On
 
Rachels Law Abmpegasus
Rachels Law AbmpegasusRachels Law Abmpegasus
Rachels Law Abmpegasus
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
 
Intelligence chief defends internet spying program
Intelligence chief defends internet spying programIntelligence chief defends internet spying program
Intelligence chief defends internet spying program
 
Usa patriot act
Usa patriot actUsa patriot act
Usa patriot act
 
Sopa and pipa
Sopa and pipaSopa and pipa
Sopa and pipa
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 

Similar to Privacy and the Government

Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxLeonardN9WWelchw
 
Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgBryan Gaston
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Actgbsmith5
 
How the Patriot Act Works by Ed Grabianowski Browse th.docx
How the Patriot Act Works by Ed Grabianowski Browse th.docxHow the Patriot Act Works by Ed Grabianowski Browse th.docx
How the Patriot Act Works by Ed Grabianowski Browse th.docxwellesleyterresa
 
Why Freedom of Information
Why Freedom of InformationWhy Freedom of Information
Why Freedom of InformationJoel J. Campbell
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 
Final Paper Com 300
Final Paper Com 300Final Paper Com 300
Final Paper Com 300William Beer
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collectiontrupassion
 

Similar to Privacy and the Government (14)

Usa Patriot Act
Usa Patriot ActUsa Patriot Act
Usa Patriot Act
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
 
Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bg
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
How the Patriot Act Works by Ed Grabianowski Browse th.docx
How the Patriot Act Works by Ed Grabianowski Browse th.docxHow the Patriot Act Works by Ed Grabianowski Browse th.docx
How the Patriot Act Works by Ed Grabianowski Browse th.docx
 
Why Freedom of Information
Why Freedom of InformationWhy Freedom of Information
Why Freedom of Information
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Final Paper Com 300
Final Paper Com 300Final Paper Com 300
Final Paper Com 300
 
Censorship
CensorshipCensorship
Censorship
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collection
 
Mea#4 1.1
Mea#4 1.1Mea#4 1.1
Mea#4 1.1
 
Nc Latest Ppt
Nc Latest PptNc Latest Ppt
Nc Latest Ppt
 

More from primeteacher32

More from primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Recently uploaded

如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证gkyvm
 
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证gakamzu
 
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证eqaqen
 
Ganga Path Project (marine drive project) Patna ,Bihar .pdf
Ganga Path Project (marine drive project) Patna ,Bihar .pdfGanga Path Project (marine drive project) Patna ,Bihar .pdf
Ganga Path Project (marine drive project) Patna ,Bihar .pdfDeepak15CivilEngg
 
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...yulianti213969
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfDeepak15CivilEngg
 
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...yulianti213969
 
We’re looking for a Technology consultant to join our Team!
We’re looking for a Technology consultant to join our Team!We’re looking for a Technology consultant to join our Team!
We’re looking for a Technology consultant to join our Team!Juli Boned
 
Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 25203records
 
Fracture design PowerPoint presentations
Fracture design PowerPoint presentationsFracture design PowerPoint presentations
Fracture design PowerPoint presentationsjitiniift
 
Biography of Doctor Arif Patel Preston UK
Biography of Doctor Arif Patel Preston UKBiography of Doctor Arif Patel Preston UK
Biography of Doctor Arif Patel Preston UKArifPatel42
 
LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024Bruce Bennett
 
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证epyhpep
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Juli Boned
 
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfUXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfDan Berlin
 
Career counseling presentation for commerce students
Career counseling presentation for commerce studentsCareer counseling presentation for commerce students
Career counseling presentation for commerce studentsHarmanDhillon43
 
We’re looking for a junior patent engineer to join our Team!
We’re looking for a junior patent engineer to join our Team!We’re looking for a junior patent engineer to join our Team!
We’re looking for a junior patent engineer to join our Team!Juli Boned
 
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...rightmanforbloodline
 
Crafting an effective CV for AYUSH Doctors.pdf
Crafting an effective CV for AYUSH Doctors.pdfCrafting an effective CV for AYUSH Doctors.pdf
Crafting an effective CV for AYUSH Doctors.pdfShri Dr Arul Selvan
 

Recently uploaded (20)

如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证
 
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
 
Ganga Path Project (marine drive project) Patna ,Bihar .pdf
Ganga Path Project (marine drive project) Patna ,Bihar .pdfGanga Path Project (marine drive project) Patna ,Bihar .pdf
Ganga Path Project (marine drive project) Patna ,Bihar .pdf
 
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
 
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
 
We’re looking for a Technology consultant to join our Team!
We’re looking for a Technology consultant to join our Team!We’re looking for a Technology consultant to join our Team!
We’re looking for a Technology consultant to join our Team!
 
Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2
 
Fracture design PowerPoint presentations
Fracture design PowerPoint presentationsFracture design PowerPoint presentations
Fracture design PowerPoint presentations
 
Biography of Doctor Arif Patel Preston UK
Biography of Doctor Arif Patel Preston UKBiography of Doctor Arif Patel Preston UK
Biography of Doctor Arif Patel Preston UK
 
LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024
 
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
 
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfUXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
 
Career counseling presentation for commerce students
Career counseling presentation for commerce studentsCareer counseling presentation for commerce students
Career counseling presentation for commerce students
 
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
 
We’re looking for a junior patent engineer to join our Team!
We’re looking for a junior patent engineer to join our Team!We’re looking for a junior patent engineer to join our Team!
We’re looking for a junior patent engineer to join our Team!
 
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
 
Crafting an effective CV for AYUSH Doctors.pdf
Crafting an effective CV for AYUSH Doctors.pdfCrafting an effective CV for AYUSH Doctors.pdf
Crafting an effective CV for AYUSH Doctors.pdf
 

Privacy and the Government

  • 2. A Balancing Act  Federal, state, and local governments in United States have had significant impact on privacy of individuals  Government must balance competing desires of citizens  desire to be left alone  desire for safety and security  National security concerns increased significantly after 9/11 attacks  Information collection: Activities that gather personal information  Information processing: Activities that store, manipulate, and use personal information that has been collected  Information dissemination: Activities that spread personal information  Invasion: Activities that intrude upon a person’s daily life, interrupt someone’s solitude, or interfere with decision-making
  • 3. Information Collection by the Government  Census Records  Census required to ensure every state has fair representation  Number of questions steadily rising  IRS Records  The 16th Amendment to the US Constitution gives the federal government the power to collect an income tax  IRS collects more than $2 trillion a year in income taxes  FBI Crime Center  NCIC  Collection of databases related to various crimes  Contains > 39 million records  DOJ Database  Gives state and local police officers access to information provided by five federal law enforcement agencies  Incident reports  Interrogation summaries  Question:What are some concerns with this type of information collection?
  • 4. The Difference between Convenience andSafety  Closed CircuitTelevision Cameras  First use in Olean, NewYork in 1968  Now more than 30 million cameras in US  NewYork City’s effort in lower Manhattan  $201 million for 3,000 new cameras  License plate readers  Radiation detectors  Effectiveness of cameras debated  Police Drones  A few police departments in US operate small unmanned drones  FAA puts restrictions on use  Public opinion mixed  Yes: Search and rescue  No: Identify speeders  Should police be required to get a search warrant before surveillance of a residence?
  • 5. Covert Government Surveillance  4th Amendment to the Constitution  “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and noWarrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”  Wiretaps and Bugs  Carnivore Surveillance System  Post 9/11  President Bush signed presidential order  OK for NSA to intercept international phone calls & emails initiated by people inside US  No search warrant required  Number of people monitored  About 500 people inside US  Another 5,000-7,000 people outside US  Two al-Qaeda plots foiled  Plot to take down Brooklyn bridge  Plot to bomb British pubs and train stations
  • 6. How Fear DrivesUs  The Patriot Act  Provisions  Greater authority to monitor communications  Greater powers to regulate banks  Greater border controls  Critics say Act undermines 4th Amendment rights  Pen registers on Web browsers  Roving surveillance  Searches and seizures without warrants  Warrants issued without need for showing probable cause  Success  Charges against 361 individuals  More than 500 people removed from United States  Terrorist cells broken up in Buffalo, Seattle, Tampa, and Portland  Failures  March 11, 2004 bombings in Madrid Spain  FBI makes Brandon Mayfield a suspect  Claims partial fingerprint match  Conducts electronic surveillance  Enters home without revealing search warrant  Copies documents and computer hard drives  Spanish authorities match fingerprint with an Algerian  Judge orders Mayfield released  FBI apologizes
  • 7. Data Mining by the Government  Data mining: Process of searching through one or more databases looking for patterns or relationships among the data  IRS Audits  IRS uses computer matching and data mining to look for possible income tax fraud  Computer matching: matching tax form information with information provided by employers, banks, etc.  Data mining: searching through forms to detect those that appear most likely to have errors resulting in underpayment of taxes  Syndromic surveillance system:A data mining system that searches for patterns indicating the outbreak of an epidemic or bioterrorism  911 calls  emergency room visits  school absenteeism  Internet searches  Example: A system in NewYork City detected an outbreak of a virus in 2002  Telecommunications Records Database  Created by National Security Agency after 9/11  Contains phone call records of tens of millions ofAmericans  NSA analyzing calling patterns to detect terrorist networks  Phone records voluntarily provided by several major telecommunications companies  Predictive Modeling  Criminals behave in a predictable way  Times of crimes fall into patterns  Some areas have higher incidence of crimes  Predictive policing: use of data mining to deploy police officers to areas where crimes are more likely to occur  Police in Santa Cruz and Los Angeles saw significant declines in property crime
  • 8. Freedom of Information Act  Federal law designed to ensure public has access to US government records  Signed by President Johnson (1966)  Applies only to executive branch  Nine exemptions  Classified documents  Trade secrets or financial information  Documents related to law enforcement investigations
  • 9. Invasion of Privacy  Government actions to prevent invasion  Do Not Call Registry  FTC responded to public opinion  Created Do Not Call Registry in 2003  More than 50 million phone numbers registered before it even took affect  Example of how privacy is treated as a prudential right  Benefit of shielding people from telemarketers judged to be greater than harm caused by limiting telephone advertising  CALMAct  Television watchers have complained to FCC about loud commercials since 1960s  CALMAct signed by PresidentObama in 2010  Requires FCC to ensure television commercials are played at same volume as programs they are interrupting  Invasive government actions  Requiring identification for pseudoephedrine purchases  Pseudoephedrine an ingredient of Sudafed and other cold medications  It is also an ingredient of methamphetamine (“meth”)  Federal and state governments have passed laws limiting access to pseudoephedrine  Limits quantity that can be purchased in a month  Identification and signature required for purchase in most states  Advanced ImagingTechnology scanners at airports

Editor's Notes

  1. Cristicsms Census Sometimes Census Bureau has broken confidentiality requirement World War I: draft resistors World War II: Japanese-Americans IRS Income tax forms contain a tremendous amount of personal information: income, assets, to whom you make charitable contributions, medical expenses, and more DOJ OneDOJ gives local police access to information about people who have not been charged with a crime There is no way to correct misinformation in raw police reports FBI Success Successes Helps police solve hundreds of thousands of cases every year Helped FBI tie James Earl Ray to assassination of Dr. Martin Luther King, Jr. Helped FBI apprehend Timothy McVeigh for bombing of federal building in Oklahoma City
  2. Wiretaps and Bugs Omstead v. United States  wiretapping OK Federal Communications Act  wiretapping made illegal Nardone v. United States  wiretapping not OK FBI continues secret wiretapping Katz v. United States  bugs not OK Allows a police agency with a court order to tap a phone for up to 30 days In 1972 US Supreme Court again rejected warrantless wiretapping, even for national security FISA FISA provides judicial and congressional oversight of covert surveillance of foreign governments and agents Allows electronic surveillance of foreign nationals for up to one year without a court order Amended in 2007 to allow government to wiretap communications to/from foreign countries without oversight by FISA Court Operation Shamrock Continuation of World War II interception of international telegrams National Security Agency (1952) Expanded to telephone calls Kennedy Organized crime figures Cuba-related individuals and businesses Johnson and Nixon Vietnam war protesters Nixon War on drugs Carnivore Created by FBI in late 1990s Monitored Internet traffic, including email exchanges Carnivore = Windows PC + “packet-sniffing” software Captured packets going to/from a particular IP address Used about 25 times between 1998 and 2000 Replaced with commercial software TALON Database Created by US Department of Defense in 2003 Supposed to contain reports of suspicious activities or terrorist threats near military bases Reports submitted by military personnel or civilians Reports assessed as “credible” or “not credible” by military experts Reports about anti-war protests added to database Many of these reports later deleted from database In 2007 new Under Secretary of Defense for Intelligence recommended that TALON be terminated PRISM
  3. Greater Monitoring Powers FBI can collect Internet, business, medical, educational, library, and church/mosque/ synagogue records without showing probable cause Issues a National Security Letter stating the records are related to an ongoing investigation; no approval from judge needed Gag orders prevent recipients (e.g., libraries) from disclosing receipt FBI issued 50,000 National Security Letters a year between 2003 and 2006
  4. Telecom database USA Today revealed existence of database in May 2006 Several dozen class-action lawsuits filed August 2006: Federal judge in Detroit ruled program illegal and unconstitutional July 2007: US Court of Appeals overturned ruling, saying plaintiffs did not have standing to bring suit forward
  5. FERPA HIPA
  6. Advanced Imaging Transportation Security Administration began installing AIT scanners in 2007 AIT scanners revealed anatomical features Electronic Privacy Information Center sued government in 2010, saying systems violated 4th Amendment and various laws TSA announced it would develop new software that would replace passenger-specific images with generic outlines All body scanners producing passenger specific images removed in 2013