SlideShare a Scribd company logo
Donald M. Edwards, CISSP, CCNA
https://www.linkedin.com/in/dmedwards
Image courtesy of the Electronic Frontier Foundation. Original can be found here:
https://commons.wikimedia.org/wiki/File:International_justice_and_privacy.jpg
CAUSES	
  OF	
  THE	
  GROWING	
  
CONFLICT	
  BETWEEN	
  
PRIVACY	
  AND	
  SECURITY	
  
Causes of the Growing Conflict between Privacy and Security
1
The struggle of maintaining an acceptable level of individual privacy is inherent in any
society which values group protection from both internal and external threats. In order to
understand the fundamental conflict between privacy and security, one must first understand that
absolute group security requires visibility into and control over internal affairs; this visibility and
control extends to the affairs of outside groups with threat capabilities as well. In contrast,
absolute personal privacy requires that individuals be able to conduct their affairs without
observation or interference from others. While it is normal for there to be occasional shifting of
the balance between privacy and security, that shift is typically gradual. However, there are
circumstances in which the balance swings abruptly toward security, usually when conflict
erupts and the relative importance of crime prevention supersedes that of individual privacy. The
conflict between security and privacy is becoming more intense because law enforcement’s
desire and capability to capture and assimilate large amounts of surveillance data is increasing
the ease with which individuals’ privacy can be violated. The conflict between security and
privacy occurs because of law enforcement’s needs to identify threat actors before crimes are
committed, to detect crimes quickly and in their early stages and to gather sufficient evidence to
attribute crimes to those who perpetrate them.
Motivation for Privacy Infringement
Speaking generally, each of these historical examples of the government’s limiting
privacy guarantees in the United States were done in the name of preventing internal threat
actors from inflicting significant damage. However, a more detailed look at the privacy-
infringing measures reveals three primary advantages being sought by law enforcement:
Causes of the Growing Conflict between Privacy and Security
2
Potential Threat Actor Identification
The Holy Grail of law enforcement is to identify those who intend to commit a crime
before they have an opportunity to act. In order to do that, law enforcement investigators must be
able to examine the behavior of everyone with means, motive and opportunity to be a threat.
Thanks to radio and other widely-available communication technology, means and opportunity
have had few limits since the beginning of the 20th
century. As a result, law enforcement is
forced to search for people giving an indication of having strong enough motive to represent a
threat. Both actively interviewing potential threat actors and passively monitoring their personal
communications represent violations of privacy, but are these violations are necessary in order to
identify individuals with motive before they take any action.
It was precisely that motive which prompted Congress to pass the Trading with the
Enemy Act of 1917 six months after the United States entered into World War I. German-
Americans were widely suspected of harboring secret loyalties to Germany. The Act included
provisions that allowed the government to intercept and read correspondence between the United
States and any foreign country during times of war (Sweeney, 2001), despite the fact that just 40
years previously the Supreme Court had ruled, “No law of Congress can place in the hands of
officials connected with the postal service any authority to invade the secrecy of letters and such
sealed packages in the mail” (U.S. Government Printing Office, 1893).
Event Early Detection
Serious crimes are seldom limited to an individual act. Instead, most major crimes require
a great deal of careful planning and many steps performed over a period of time. By examining
potential threat actors’ behavior, it may be possible to identify a crime in progress before the full
Causes of the Growing Conflict between Privacy and Security
3
plan is carried out. For example, the Oklahoma City bombing in 1995 could possibly have been
prevented if law enforcement had noticed that the bombers had rented a large truck and were
purchasing large amounts of fertilizer in multiple transactions, despite the fact that they had no
legitimate use for it (Mark E. Koltko-Rivera, 2004).
Attribution
After a crime is committed, law enforcement faces a significant challenge in piecing
together enough information to establish who was involved. In some types of crimes, such as
those involving physical violence, trace evidence is often left behind which can be used to help
identify the culprit. Many other crimes, however, leave no traces without some form of active
surveillance that records everyone’s actions to be examined in later investigation.
Basis of Growing Privacy Concerns
The most extreme suspension of privacy rights in U.S. history came in the wake of the
September 11, 2001 terrorist attacks. Shortly after the attacks, Congress enacted the USA
PATRIOT Act, which included provisions allowing warrantless domestic surveillance (Ahn,
2014), enabling the government to keep records on every electronic communication in the United
States. The acts of surveillance and keeping records are not necessarily privacy-infringing
themselves. Financial records, transaction histories and access logs, for example, are commonly
kept for essential purposes that are generally understood and accepted. However, when these
types of information are connected with other information or put to uses other than the ones for
which they were collected, privacy concerns are raised.
Thanks to continuing advances in computing power and data storage, it is now possible to
store and easily correlate staggering amounts of data which, when used appropriately, are a
powerful tool for law enforcement. However, as more information is collected and easily
Causes of the Growing Conflict between Privacy and Security
4
associated, the potential for error and abuse rises dramatically because of the ease with which it
can be accessed by those who possess it. For examples of these kinds of privacy violations, we
need only look as far as the National Security Agency’s own oversight reports that give details of
thousands of privacy violations discovered during internal records audits (National Security
Agency, 2014).
Conclusion
Surveillance and record keeping can be extremely powerful tools that can help law
enforcement maintain the security of the nation and its citizens. Like all powerful tools, however,
they can be easily misused by someone with the means, motive and opportunity to do so. When
used properly and for legitimate investigations, the collected information represents no threat to
privacy. However, because of the sheer volume of data and the ease with which it can be
accessed improperly, the threat to the right to privacy is significant and growing at the same pace
as the utility of that data to law enforcement. The enduring irony of collecting data to identify
people with malevolent motives is that in doing so it raises questions about the motives of law
enforcement itself.
Causes of the Growing Conflict between Privacy and Security
5
References
Ahn, J. (2014). Seizure of Electronic Data under the USA PATRIOT Act. Law School Student
Scholarship.
Deno, F., Diaz, C., Lliguicota, C., Norman, D., & González, R.-O. (2014). TSA SCREENING
PROCEDURES: A THREAT TO PRIVACY. International Journal of Arts & Sciences.
Mark E. Koltko-Rivera, P. (2004). Detection of Terrorist Preparations by an Artificial
Intelligence Expert System Employing Fuzzy Signal Detection Theory. Retrieved from
Defense Technical Information Center: http://www.dtic.mil/cgi-
bin/GetTRDoc?AD=ADA460204
National Security Agency. (2014). NSA Reports to the President's Intelligence Oversight Board
(IOB).
Smyth, D. J. (2008). Freedom of the Press and National Security in Four Wars: World War I,
World War II, the Vietnam War, and the War on Terrorism.
Sweeney, M. S. (2001). Secrets of Victory: The Office of Censorship and the American Press
and Radio in World War II.
U.S. Government Printing Office. (1893). Postal Laws and Regulations of the United States of
America.

More Related Content

What's hot

Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Securicon
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Powerpoint
PowerpointPowerpoint
Powerpoint
Marcelomazzocato
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGLillian Ekwosi-Egbulem
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
Emerson Bryan
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
Info_Studies_Aberystwyth
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
Crystal Miller
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi
 
TIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__revTIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__rev
jackpopo
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
simba35
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
simba35
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALLouise Collins
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
Internet Law Center
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
Deborah Gonzalez, Esq.
 

What's hot (20)

Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Wired-feature
Wired-featureWired-feature
Wired-feature
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
TIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__revTIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__rev
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
Policy Briefing Presentation
Policy Briefing PresentationPolicy Briefing Presentation
Policy Briefing Presentation
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 

Viewers also liked

Дев'ятикласникам
Дев'ятикласникамДев'ятикласникам
Дев'ятикласникам
Наталія Пилипенко
 
I Roscilli Final Presentation
I Roscilli Final PresentationI Roscilli Final Presentation
I Roscilli Final PresentationBradford Hosking
 
2. intro to java
2. intro to java2. intro to java
2. intro to java
Vishal Singh
 
Georgia Pacific—Case Competition
Georgia Pacific—Case CompetitionGeorgia Pacific—Case Competition
Georgia Pacific—Case CompetitionBradford Hosking
 
Interesting content: Synectics (Gordon/Little's method)
Interesting content: Synectics (Gordon/Little's method)Interesting content: Synectics (Gordon/Little's method)
Interesting content: Synectics (Gordon/Little's method)
Jorclaret
 
Notre catalogue 2012-2013
Notre catalogue   2012-2013Notre catalogue   2012-2013
Notre catalogue 2012-2013
Julien Voyez
 
Eripm wd bgt0000 nbk
Eripm wd bgt0000 nbkEripm wd bgt0000 nbk
Eripm wd bgt0000 nbkSprl Eripm
 
Formation Environnement et réglementation bancaire
Formation Environnement et réglementation bancaireFormation Environnement et réglementation bancaire
Formation Environnement et réglementation bancaire
Actions-Finance
 
Personal branding, la maîtrise parfaite de linkedin
Personal branding, la maîtrise parfaite de linkedinPersonal branding, la maîtrise parfaite de linkedin
Personal branding, la maîtrise parfaite de linkedin
Extend Coaching
 

Viewers also liked (9)

Дев'ятикласникам
Дев'ятикласникамДев'ятикласникам
Дев'ятикласникам
 
I Roscilli Final Presentation
I Roscilli Final PresentationI Roscilli Final Presentation
I Roscilli Final Presentation
 
2. intro to java
2. intro to java2. intro to java
2. intro to java
 
Georgia Pacific—Case Competition
Georgia Pacific—Case CompetitionGeorgia Pacific—Case Competition
Georgia Pacific—Case Competition
 
Interesting content: Synectics (Gordon/Little's method)
Interesting content: Synectics (Gordon/Little's method)Interesting content: Synectics (Gordon/Little's method)
Interesting content: Synectics (Gordon/Little's method)
 
Notre catalogue 2012-2013
Notre catalogue   2012-2013Notre catalogue   2012-2013
Notre catalogue 2012-2013
 
Eripm wd bgt0000 nbk
Eripm wd bgt0000 nbkEripm wd bgt0000 nbk
Eripm wd bgt0000 nbk
 
Formation Environnement et réglementation bancaire
Formation Environnement et réglementation bancaireFormation Environnement et réglementation bancaire
Formation Environnement et réglementation bancaire
 
Personal branding, la maîtrise parfaite de linkedin
Personal branding, la maîtrise parfaite de linkedinPersonal branding, la maîtrise parfaite de linkedin
Personal branding, la maîtrise parfaite de linkedin
 

Similar to Causes of the Growing Conflict Between Privacy and Security

Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
toltonkendal
 
Running Head INTELLIGENCE GATHERING .docx
Running Head INTELLIGENCE GATHERING                              .docxRunning Head INTELLIGENCE GATHERING                              .docx
Running Head INTELLIGENCE GATHERING .docx
wlynn1
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
OllieShoresna
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
rosemaryralphs52525
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
Jill Lyons
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Juan J Malfavon pursuing criminal justice outline
Juan J Malfavon pursuing criminal justice outlineJuan J Malfavon pursuing criminal justice outline
Juan J Malfavon pursuing criminal justice outline
juansclass
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
EvonCanales257
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informaticsmali chum
 

Similar to Causes of the Growing Conflict Between Privacy and Security (11)

Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
Running Head INTELLIGENCE GATHERING .docx
Running Head INTELLIGENCE GATHERING                              .docxRunning Head INTELLIGENCE GATHERING                              .docx
Running Head INTELLIGENCE GATHERING .docx
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Juan J Malfavon pursuing criminal justice outline
Juan J Malfavon pursuing criminal justice outlineJuan J Malfavon pursuing criminal justice outline
Juan J Malfavon pursuing criminal justice outline
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Causes of the Growing Conflict Between Privacy and Security

  • 1. Donald M. Edwards, CISSP, CCNA https://www.linkedin.com/in/dmedwards Image courtesy of the Electronic Frontier Foundation. Original can be found here: https://commons.wikimedia.org/wiki/File:International_justice_and_privacy.jpg CAUSES  OF  THE  GROWING   CONFLICT  BETWEEN   PRIVACY  AND  SECURITY  
  • 2. Causes of the Growing Conflict between Privacy and Security 1 The struggle of maintaining an acceptable level of individual privacy is inherent in any society which values group protection from both internal and external threats. In order to understand the fundamental conflict between privacy and security, one must first understand that absolute group security requires visibility into and control over internal affairs; this visibility and control extends to the affairs of outside groups with threat capabilities as well. In contrast, absolute personal privacy requires that individuals be able to conduct their affairs without observation or interference from others. While it is normal for there to be occasional shifting of the balance between privacy and security, that shift is typically gradual. However, there are circumstances in which the balance swings abruptly toward security, usually when conflict erupts and the relative importance of crime prevention supersedes that of individual privacy. The conflict between security and privacy is becoming more intense because law enforcement’s desire and capability to capture and assimilate large amounts of surveillance data is increasing the ease with which individuals’ privacy can be violated. The conflict between security and privacy occurs because of law enforcement’s needs to identify threat actors before crimes are committed, to detect crimes quickly and in their early stages and to gather sufficient evidence to attribute crimes to those who perpetrate them. Motivation for Privacy Infringement Speaking generally, each of these historical examples of the government’s limiting privacy guarantees in the United States were done in the name of preventing internal threat actors from inflicting significant damage. However, a more detailed look at the privacy- infringing measures reveals three primary advantages being sought by law enforcement:
  • 3. Causes of the Growing Conflict between Privacy and Security 2 Potential Threat Actor Identification The Holy Grail of law enforcement is to identify those who intend to commit a crime before they have an opportunity to act. In order to do that, law enforcement investigators must be able to examine the behavior of everyone with means, motive and opportunity to be a threat. Thanks to radio and other widely-available communication technology, means and opportunity have had few limits since the beginning of the 20th century. As a result, law enforcement is forced to search for people giving an indication of having strong enough motive to represent a threat. Both actively interviewing potential threat actors and passively monitoring their personal communications represent violations of privacy, but are these violations are necessary in order to identify individuals with motive before they take any action. It was precisely that motive which prompted Congress to pass the Trading with the Enemy Act of 1917 six months after the United States entered into World War I. German- Americans were widely suspected of harboring secret loyalties to Germany. The Act included provisions that allowed the government to intercept and read correspondence between the United States and any foreign country during times of war (Sweeney, 2001), despite the fact that just 40 years previously the Supreme Court had ruled, “No law of Congress can place in the hands of officials connected with the postal service any authority to invade the secrecy of letters and such sealed packages in the mail” (U.S. Government Printing Office, 1893). Event Early Detection Serious crimes are seldom limited to an individual act. Instead, most major crimes require a great deal of careful planning and many steps performed over a period of time. By examining potential threat actors’ behavior, it may be possible to identify a crime in progress before the full
  • 4. Causes of the Growing Conflict between Privacy and Security 3 plan is carried out. For example, the Oklahoma City bombing in 1995 could possibly have been prevented if law enforcement had noticed that the bombers had rented a large truck and were purchasing large amounts of fertilizer in multiple transactions, despite the fact that they had no legitimate use for it (Mark E. Koltko-Rivera, 2004). Attribution After a crime is committed, law enforcement faces a significant challenge in piecing together enough information to establish who was involved. In some types of crimes, such as those involving physical violence, trace evidence is often left behind which can be used to help identify the culprit. Many other crimes, however, leave no traces without some form of active surveillance that records everyone’s actions to be examined in later investigation. Basis of Growing Privacy Concerns The most extreme suspension of privacy rights in U.S. history came in the wake of the September 11, 2001 terrorist attacks. Shortly after the attacks, Congress enacted the USA PATRIOT Act, which included provisions allowing warrantless domestic surveillance (Ahn, 2014), enabling the government to keep records on every electronic communication in the United States. The acts of surveillance and keeping records are not necessarily privacy-infringing themselves. Financial records, transaction histories and access logs, for example, are commonly kept for essential purposes that are generally understood and accepted. However, when these types of information are connected with other information or put to uses other than the ones for which they were collected, privacy concerns are raised. Thanks to continuing advances in computing power and data storage, it is now possible to store and easily correlate staggering amounts of data which, when used appropriately, are a powerful tool for law enforcement. However, as more information is collected and easily
  • 5. Causes of the Growing Conflict between Privacy and Security 4 associated, the potential for error and abuse rises dramatically because of the ease with which it can be accessed by those who possess it. For examples of these kinds of privacy violations, we need only look as far as the National Security Agency’s own oversight reports that give details of thousands of privacy violations discovered during internal records audits (National Security Agency, 2014). Conclusion Surveillance and record keeping can be extremely powerful tools that can help law enforcement maintain the security of the nation and its citizens. Like all powerful tools, however, they can be easily misused by someone with the means, motive and opportunity to do so. When used properly and for legitimate investigations, the collected information represents no threat to privacy. However, because of the sheer volume of data and the ease with which it can be accessed improperly, the threat to the right to privacy is significant and growing at the same pace as the utility of that data to law enforcement. The enduring irony of collecting data to identify people with malevolent motives is that in doing so it raises questions about the motives of law enforcement itself.
  • 6. Causes of the Growing Conflict between Privacy and Security 5 References Ahn, J. (2014). Seizure of Electronic Data under the USA PATRIOT Act. Law School Student Scholarship. Deno, F., Diaz, C., Lliguicota, C., Norman, D., & González, R.-O. (2014). TSA SCREENING PROCEDURES: A THREAT TO PRIVACY. International Journal of Arts & Sciences. Mark E. Koltko-Rivera, P. (2004). Detection of Terrorist Preparations by an Artificial Intelligence Expert System Employing Fuzzy Signal Detection Theory. Retrieved from Defense Technical Information Center: http://www.dtic.mil/cgi- bin/GetTRDoc?AD=ADA460204 National Security Agency. (2014). NSA Reports to the President's Intelligence Oversight Board (IOB). Smyth, D. J. (2008). Freedom of the Press and National Security in Four Wars: World War I, World War II, the Vietnam War, and the War on Terrorism. Sweeney, M. S. (2001). Secrets of Victory: The Office of Censorship and the American Press and Radio in World War II. U.S. Government Printing Office. (1893). Postal Laws and Regulations of the United States of America.