Privacy Part 2: Government Surveillance: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
Line 108: Line 108:
-----
-----
After reading all materials it seems that it is impossible to be secured from survellience in the "century of technologies". From one hand, the government survelliance aims to protect us from terrorizm and other hazards. From another hand, it restricts the people's right on freedom of speech. But, nowadays I didn't see that just ordinary citizen was killed because of the content of his message. Let's assume that the content of email is accessed by government, but it doesn't become public. But, the situation is different when it comes to active person, whose speechs/e-mail could rise threats to government. If the threat already exist, this person would be under survellience even in times BC and now, in time of technologies. So, the internet doesn't play a great role here. Still, there are some tools which could somehow prevent the cyber attacks: for example strong code combination. If the code is secure, then it will be diffucult for the computer to break your code. Aysel Ibayeva ([[User:Aysel|Aysel]] 14:37, 8 April 2014 (EDT))
After reading all materials it seems that it is impossible to be secured from survellience in the "century of technologies". From one hand, the government survelliance aims to protect us from terrorizm and other hazards. From another hand, it restricts the people's right on freedom of speech. But, nowadays I didn't see that just ordinary citizen was killed because of the content of his message. Let's assume that the content of email is accessed by government, but it doesn't become public. But, the situation is different when it comes to active person, whose speechs/e-mail could rise threats to government. If the threat already exist, this person would be under survellience even in times BC and now, in time of technologies. So, the internet doesn't play a great role here. Still, there are some tools which could somehow prevent the cyber attacks: for example strong code combination. If the code is secure, then it will be diffucult for the computer to break your code. Aysel Ibayeva ([[User:Aysel|Aysel]] 14:37, 8 April 2014 (EDT))
----
I thought this might be useful as well: "Big data is here to stay, as it should be. But let’s be realistic: It’s an important resource for anyone analyzing data, not a silver bullet." http://www.nytimes.com/2014/04/07/opinion/eight-no-nine-problems-with-big-data.html?src=me&module=Ribbon&version=context&region=Header&action=click&contentCollection=Most%20Emailed&pgtype=article [[User:VACYBER|VACYBER]] 14:53, 8 April 2014 (EDT)
----

Revision as of 13:53, 8 April 2014

April 8

Last week we looked at big-picture concepts of privacy and how the Internet and Internet companies reflect these issues. This week we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, and what that does to us and the Internet as a system.

Joining us for this week are Berkman fellow and online security expert Bruce Schneier and Berkman Clinical Instructional Fellow Kit Walsh.

There is a related event at Harvard Law School earlier on this class day that may be of interest to students (RSVP required).


Readings

Government vs. Corporate Surveillance
Case Study - the NSA Scandal and Surveillance Policy
Surveillance and U.S. law
  • If you're interested, the Donohue article can be found here.

Optional Readings

  • The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment


Videos Watched in Class

Links

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 15:12, 7 November 2013 (EST)




Maybe I'm missing something, but what, exactly, has the government been doing with the information they have gotten through the NSA? It doesn't seem like they've been using it to incriminate individual citizens or even monitor them too extensively-- otherwise, wouldn't they have been able to track down would-be criminals prior to them committing crimes, a la Minority Report? They also don't seem to be monitoring it for the purpose of censorship, as is the case in China and Russia or the HUAC. And how are they even conducting their "research"? Do individuals actually go through all of that information, or is it a case whereby a machine compiles data and directs NSA employees' attentions only to cases where there are a multitude of 'questionable' searches/calls/etc.? As far as foreign policy is concerned, the act of spying on other governments has been practiced since the beginning of history. Does the advent of technology change what is acceptable in regards to spying, or only make it more accessible? With nuclear war so very possible in our times, it seems like some sort of action must be taken to monitor the intentions of other countries and their relations with the US and alliances with other countries, since transparency seems to be an impossible ideal for all countries. Castille 15:52, 5 April 2014 (EDT)

  • The problem is that we don't know what they do with the information because that is secret, and is also used for secret trials in secret courts. The problem is that even if the use of the information is benevolent and well-intentioned, it is worrisome because we're creating the technological foundation for totalitarianism. Now, I don't actually think we're extremely close to creating a totalitarian state but it doesn't mean that it isn't worrisome or that in the wrong political environment we might eventually get there. Jradoff 08:25, 8 April 2014 (EDT)
  • Ah, gotcha! No wonder I felt like I was missing something-- we all are! I didn't realize that they're actually hiding what they're doing with the information. Do you know what theory for how they are using the data is most likely?

Castille 12:19, 8 April 2014 (EDT)



The Guardian article- informative content, but I want to comment on its amazing user interface. This is where the web should be heading. In the same way that HTML provides markup to words and sentences, the interactive features of this article help to mark up the thoughts & ideas presented in the article. Very nicely done. Erin Saucke-Lacelle 22:55, 6 April 2014 (EDT)

  • I couldn't agree more. The interface was AMAZING! Don't think I've ever seen an article like that before.

Castille 12:19, 8 April 2014 (EDT)



I am very interested to see what new data mining policies are made or both the government and corporations. Despite the reveal that we lack privacy (collection of lots of personal data from each sector), it would be nice if we had the right to know which data and on what terms data is collected on us. Agreed these are probably in the majority of privacy agreements I don't read. Trying harder to be transparent and clear with these privacy regulations would help society to at least be not as shocked by large government leaks. (Margorm 17:58, 7 April 2014 (EDT))


The Brian Fung article makes a fine point about the higher "cost" of switching from the United States to a different country, due to the government's monopoly on a range of services. However, this strikes me as a weak way to compare corporate data mining to government intrusion. In my opinion, the purpose of having a Constitution containing guaranteed rights is so that these costs need not be considered or incurred in the first place. If the US government needs to collect private information about its citizens, then it needs to be done within the restrictions of the Fourth Amendment. If exceptions need to be made it needs to be done with the public's knowledge and consent. Jradoff 08:35, 8 April 2014 (EDT)


I too came away from the Brian Fung article feeling dissatisfied with the comparison of government and corporate intrusion-- especially in light of this week's readings that make it abundantly clear to me that we are not able to "quit" or opt-out of either corporate data mining or government surveillance. I lived overseas in Asia and Europe with my last job and certainly didn't "quit" the United States, in fact I anticipated a greater impact on my "hard-to-measure modicum of privacy"- both tangible and intangible. As Fung suggests, most expats or Americans on short-term contracts overseas whom I knew and worked with openly acknowledged the higher level of scrutiny anticipated regarding correspondence, finances, and eve relationships once overseas- especially for those who intended to return to working life in the US after a time. Interestingly, the majority of these individuals were often more comfortable with- and even welcomed- decreased privacy given the positive correlation in their minds with increased security for their work and families while overseas. I will be interested to see whether cases related to data privacy and online surveillance engage the fourth amendment in the coming years- and especially whether the legal landscape at the highest levels is equipped to respond to such a quickly-evolving corporate and government culture of surveillance. akk22 10:39, 8 April 2014 (EDT)


Regarding the 'huge difference between government and corporate surveillance.' | There's so much to talk about on this topic, so I'll keep it short by playing a bit of devil's advocate. Is there truly that much of a significant difference between the two surveillance types? Both are working towards the same goal: the protection and accumulation of dollars. In the corporate sense, surveillance allows for the ability to make more dollars. With government surveillance, it allows for the preservation of the capitalist system — to maintain the corporate ecosystem. (Hence the argument that corporations still have a stronghold on our online privacy, regardless of who is responsible for the act of surveillance.) Twood 09:31, 8 April 2014 (EDT)

  • It seems unfair to me to suggest that government surveillance is solely to preserve the corporate ecosystem-- surely, issues of national security extend to individuals as well as corporations. I think that government surveillance is much more geared towards protection of the individual than corporate surveillance, which is completely for the purpose of accumulating capital. Castille 12:19, 8 April 2014 (EDT)

Playing Devils Advocate as well, I'm less concerned with government collection of data traffic. The massive collections that exist and increase exponentially on a daily basis are still subject to human interaction. Hiring of skilled staff with Hadoop, Hive, Pig, HBase, R, etc., are still subject to the human element. Threats are real within national security and threats are many. One might argue that we cannot handle sifting the data for agreed upon missions. I'm certainly not worried about my conversation requesting the more mundane issues of life. I am worried however, about the collection, packaging, selling and reselling of corporate collected data. The data crosses so many entities that control is truly impossible. There is a reason the Romans would hide items under a Rose bush - Messengers can always be intercepted.VACYBER 13:59, 8 April 2014 (EDT)


The Battle for Power on the Internet was a great talk and made some great points. I like his idea of the quick versus the strong, saying that the marginalized was quick to use the Internet to organize but although the institutions were slower, they use power more effectively. I’m looking forward to talking more about this in class. Lpereira 14:06, 8 April 2014 (EDT)


After reading all materials it seems that it is impossible to be secured from survellience in the "century of technologies". From one hand, the government survelliance aims to protect us from terrorizm and other hazards. From another hand, it restricts the people's right on freedom of speech. But, nowadays I didn't see that just ordinary citizen was killed because of the content of his message. Let's assume that the content of email is accessed by government, but it doesn't become public. But, the situation is different when it comes to active person, whose speechs/e-mail could rise threats to government. If the threat already exist, this person would be under survellience even in times BC and now, in time of technologies. So, the internet doesn't play a great role here. Still, there are some tools which could somehow prevent the cyber attacks: for example strong code combination. If the code is secure, then it will be diffucult for the computer to break your code. Aysel Ibayeva (Aysel 14:37, 8 April 2014 (EDT))


I thought this might be useful as well: "Big data is here to stay, as it should be. But let’s be realistic: It’s an important resource for anyone analyzing data, not a silver bullet." http://www.nytimes.com/2014/04/07/opinion/eight-no-nine-problems-with-big-data.html?src=me&module=Ribbon&version=context&region=Header&action=click&contentCollection=Most%20Emailed&pgtype=article VACYBER 14:53, 8 April 2014 (EDT)