Causes of the Growing Conflict Between Privacy and Security

Don Edwards
Don EdwardsEnabling customers to gain the benefits of AWS cloud offerings while securing their data. em Amazon Web Services

The struggle of maintaining an acceptable level of individual privacy is inherent in any society which values group protection from both internal and external threats. This paper illustrates the competing priorities that are the source of the conflict between privacy and security.

Donald M. Edwards, CISSP, CCNA
https://www.linkedin.com/in/dmedwards
Image courtesy of the Electronic Frontier Foundation. Original can be found here:
https://commons.wikimedia.org/wiki/File:International_justice_and_privacy.jpg
CAUSES	
  OF	
  THE	
  GROWING	
  
CONFLICT	
  BETWEEN	
  
PRIVACY	
  AND	
  SECURITY	
  
Causes of the Growing Conflict between Privacy and Security
1
The struggle of maintaining an acceptable level of individual privacy is inherent in any
society which values group protection from both internal and external threats. In order to
understand the fundamental conflict between privacy and security, one must first understand that
absolute group security requires visibility into and control over internal affairs; this visibility and
control extends to the affairs of outside groups with threat capabilities as well. In contrast,
absolute personal privacy requires that individuals be able to conduct their affairs without
observation or interference from others. While it is normal for there to be occasional shifting of
the balance between privacy and security, that shift is typically gradual. However, there are
circumstances in which the balance swings abruptly toward security, usually when conflict
erupts and the relative importance of crime prevention supersedes that of individual privacy. The
conflict between security and privacy is becoming more intense because law enforcement’s
desire and capability to capture and assimilate large amounts of surveillance data is increasing
the ease with which individuals’ privacy can be violated. The conflict between security and
privacy occurs because of law enforcement’s needs to identify threat actors before crimes are
committed, to detect crimes quickly and in their early stages and to gather sufficient evidence to
attribute crimes to those who perpetrate them.
Motivation for Privacy Infringement
Speaking generally, each of these historical examples of the government’s limiting
privacy guarantees in the United States were done in the name of preventing internal threat
actors from inflicting significant damage. However, a more detailed look at the privacy-
infringing measures reveals three primary advantages being sought by law enforcement:
Causes of the Growing Conflict between Privacy and Security
2
Potential Threat Actor Identification
The Holy Grail of law enforcement is to identify those who intend to commit a crime
before they have an opportunity to act. In order to do that, law enforcement investigators must be
able to examine the behavior of everyone with means, motive and opportunity to be a threat.
Thanks to radio and other widely-available communication technology, means and opportunity
have had few limits since the beginning of the 20th
century. As a result, law enforcement is
forced to search for people giving an indication of having strong enough motive to represent a
threat. Both actively interviewing potential threat actors and passively monitoring their personal
communications represent violations of privacy, but are these violations are necessary in order to
identify individuals with motive before they take any action.
It was precisely that motive which prompted Congress to pass the Trading with the
Enemy Act of 1917 six months after the United States entered into World War I. German-
Americans were widely suspected of harboring secret loyalties to Germany. The Act included
provisions that allowed the government to intercept and read correspondence between the United
States and any foreign country during times of war (Sweeney, 2001), despite the fact that just 40
years previously the Supreme Court had ruled, “No law of Congress can place in the hands of
officials connected with the postal service any authority to invade the secrecy of letters and such
sealed packages in the mail” (U.S. Government Printing Office, 1893).
Event Early Detection
Serious crimes are seldom limited to an individual act. Instead, most major crimes require
a great deal of careful planning and many steps performed over a period of time. By examining
potential threat actors’ behavior, it may be possible to identify a crime in progress before the full
Causes of the Growing Conflict between Privacy and Security
3
plan is carried out. For example, the Oklahoma City bombing in 1995 could possibly have been
prevented if law enforcement had noticed that the bombers had rented a large truck and were
purchasing large amounts of fertilizer in multiple transactions, despite the fact that they had no
legitimate use for it (Mark E. Koltko-Rivera, 2004).
Attribution
After a crime is committed, law enforcement faces a significant challenge in piecing
together enough information to establish who was involved. In some types of crimes, such as
those involving physical violence, trace evidence is often left behind which can be used to help
identify the culprit. Many other crimes, however, leave no traces without some form of active
surveillance that records everyone’s actions to be examined in later investigation.
Basis of Growing Privacy Concerns
The most extreme suspension of privacy rights in U.S. history came in the wake of the
September 11, 2001 terrorist attacks. Shortly after the attacks, Congress enacted the USA
PATRIOT Act, which included provisions allowing warrantless domestic surveillance (Ahn,
2014), enabling the government to keep records on every electronic communication in the United
States. The acts of surveillance and keeping records are not necessarily privacy-infringing
themselves. Financial records, transaction histories and access logs, for example, are commonly
kept for essential purposes that are generally understood and accepted. However, when these
types of information are connected with other information or put to uses other than the ones for
which they were collected, privacy concerns are raised.
Thanks to continuing advances in computing power and data storage, it is now possible to
store and easily correlate staggering amounts of data which, when used appropriately, are a
powerful tool for law enforcement. However, as more information is collected and easily
Causes of the Growing Conflict between Privacy and Security
4
associated, the potential for error and abuse rises dramatically because of the ease with which it
can be accessed by those who possess it. For examples of these kinds of privacy violations, we
need only look as far as the National Security Agency’s own oversight reports that give details of
thousands of privacy violations discovered during internal records audits (National Security
Agency, 2014).
Conclusion
Surveillance and record keeping can be extremely powerful tools that can help law
enforcement maintain the security of the nation and its citizens. Like all powerful tools, however,
they can be easily misused by someone with the means, motive and opportunity to do so. When
used properly and for legitimate investigations, the collected information represents no threat to
privacy. However, because of the sheer volume of data and the ease with which it can be
accessed improperly, the threat to the right to privacy is significant and growing at the same pace
as the utility of that data to law enforcement. The enduring irony of collecting data to identify
people with malevolent motives is that in doing so it raises questions about the motives of law
enforcement itself.
Causes of the Growing Conflict between Privacy and Security
5
References
Ahn, J. (2014). Seizure of Electronic Data under the USA PATRIOT Act. Law School Student
Scholarship.
Deno, F., Diaz, C., Lliguicota, C., Norman, D., & González, R.-O. (2014). TSA SCREENING
PROCEDURES: A THREAT TO PRIVACY. International Journal of Arts & Sciences.
Mark E. Koltko-Rivera, P. (2004). Detection of Terrorist Preparations by an Artificial
Intelligence Expert System Employing Fuzzy Signal Detection Theory. Retrieved from
Defense Technical Information Center: http://www.dtic.mil/cgi-
bin/GetTRDoc?AD=ADA460204
National Security Agency. (2014). NSA Reports to the President's Intelligence Oversight Board
(IOB).
Smyth, D. J. (2008). Freedom of the Press and National Security in Four Wars: World War I,
World War II, the Vietnam War, and the War on Terrorism.
Sweeney, M. S. (2001). Secrets of Victory: The Office of Censorship and the American Press
and Radio in World War II.
U.S. Government Printing Office. (1893). Postal Laws and Regulations of the United States of
America.

Recomendados

Argument for Snowden Clemency por
Argument for Snowden ClemencyArgument for Snowden Clemency
Argument for Snowden ClemencyMargaret Hoisington
294 visualizações8 slides
80223977 school surveillance por
80223977 school surveillance80223977 school surveillance
80223977 school surveillanceskimkiper
389 visualizações5 slides
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING por
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
17 visualizações8 slides
The securitization of online activism por
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
375 visualizações13 slides
Great Issues Reflective Essay CybersecurityLI por
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
203 visualizações10 slides
HacktivismPaper.docx por
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
543 visualizações18 slides

Mais conteúdo relacionado

Mais procurados

Looking Ahead Why 2019 Will Be The year of Cyberwarfare por
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareSecuricon
37 visualizações5 slides
Smartphone Encryption and the FBI Demystified por
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
165 visualizações4 slides
Powerpoint por
PowerpointPowerpoint
PowerpointMarcelomazzocato
643 visualizações34 slides
Social Engineering por
Social EngineeringSocial Engineering
Social EngineeringNeelu Tripathy
245 visualizações20 slides
Wired-feature por
Wired-featureWired-feature
Wired-featureKillian Gallagher-Mundy
31 visualizações1 slide
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING por
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGLillian Ekwosi-Egbulem
1.2K visualizações7 slides

Mais procurados(20)

Looking Ahead Why 2019 Will Be The year of Cyberwarfare por Securicon
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Securicon37 visualizações
Smartphone Encryption and the FBI Demystified por Michael Sexton
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton165 visualizações
Powerpoint por Marcelomazzocato
PowerpointPowerpoint
Powerpoint
Marcelomazzocato643 visualizações
Social Engineering por Neelu Tripathy
Social EngineeringSocial Engineering
Social Engineering
Neelu Tripathy245 visualizações
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING por Lillian Ekwosi-Egbulem
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
Lillian Ekwosi-Egbulem1.2K visualizações
E. Bryan - E-Governance and Personal Privacy por Emerson Bryan
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
Emerson Bryan515 visualizações
Privacy in a Human Rights and Social Justice Context por Info_Studies_Aberystwyth
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
Info_Studies_Aberystwyth2.4K visualizações
Why Are We Being Watched? por Crystal Miller
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
Crystal Miller106 visualizações
Bashar H. Malkawi, The Forum on National Security Law por Bashar H. Malkawi
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi71 visualizações
TIK_4. pengelolaan informasi_20161__rev por jackpopo
TIK_4. pengelolaan informasi_20161__revTIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__rev
jackpopo476 visualizações
Hello dr. aguiar and classmates,for this week’s forum we were as por simba35
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
simba357 visualizações
Instructions please write a 5 page paper answering the question con por simba35
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
simba3530 visualizações
Major Essay_ US-China Relations_FINAL por Louise Collins
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
Louise Collins527 visualizações
Cyber Security Basics for the WFH Economy por Internet Law Center
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
Internet Law Center97 visualizações
Policy Briefing Presentation por Patrick Thomas Cannon
Policy Briefing PresentationPolicy Briefing Presentation
Policy Briefing Presentation
Patrick Thomas Cannon108 visualizações
Uga Social Media Privacy June2011 por Deborah Gonzalez, Esq.
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
Deborah Gonzalez, Esq.442 visualizações

Destaque

Дев'ятикласникам por
Дев'ятикласникамДев'ятикласникам
Дев'ятикласникамНаталія Пилипенко
307 visualizações17 slides
I Roscilli Final Presentation por
I Roscilli Final PresentationI Roscilli Final Presentation
I Roscilli Final PresentationBradford Hosking
91 visualizações40 slides
2. intro to java por
2. intro to java2. intro to java
2. intro to javaVishal Singh
110 visualizações10 slides
Georgia Pacific—Case Competition por
Georgia Pacific—Case CompetitionGeorgia Pacific—Case Competition
Georgia Pacific—Case CompetitionBradford Hosking
116 visualizações11 slides
Interesting content: Synectics (Gordon/Little's method) por
Interesting content: Synectics (Gordon/Little's method)Interesting content: Synectics (Gordon/Little's method)
Interesting content: Synectics (Gordon/Little's method)Jorclaret
1.1K visualizações12 slides
Notre catalogue 2012-2013 por
Notre catalogue   2012-2013Notre catalogue   2012-2013
Notre catalogue 2012-2013Julien Voyez
3.9K visualizações17 slides

Destaque(9)

I Roscilli Final Presentation por Bradford Hosking
I Roscilli Final PresentationI Roscilli Final Presentation
I Roscilli Final Presentation
Bradford Hosking91 visualizações
2. intro to java por Vishal Singh
2. intro to java2. intro to java
2. intro to java
Vishal Singh110 visualizações
Georgia Pacific—Case Competition por Bradford Hosking
Georgia Pacific—Case CompetitionGeorgia Pacific—Case Competition
Georgia Pacific—Case Competition
Bradford Hosking116 visualizações
Interesting content: Synectics (Gordon/Little's method) por Jorclaret
Interesting content: Synectics (Gordon/Little's method)Interesting content: Synectics (Gordon/Little's method)
Interesting content: Synectics (Gordon/Little's method)
Jorclaret1.1K visualizações
Notre catalogue 2012-2013 por Julien Voyez
Notre catalogue   2012-2013Notre catalogue   2012-2013
Notre catalogue 2012-2013
Julien Voyez3.9K visualizações
Eripm wd bgt0000 nbk por Sprl Eripm
Eripm wd bgt0000 nbkEripm wd bgt0000 nbk
Eripm wd bgt0000 nbk
Sprl Eripm4.9K visualizações
Formation Environnement et réglementation bancaire por Actions-Finance
Formation Environnement et réglementation bancaireFormation Environnement et réglementation bancaire
Formation Environnement et réglementation bancaire
Actions-Finance5.5K visualizações
Personal branding, la maîtrise parfaite de linkedin por Extend Coaching
Personal branding, la maîtrise parfaite de linkedinPersonal branding, la maîtrise parfaite de linkedin
Personal branding, la maîtrise parfaite de linkedin
Extend Coaching6.2K visualizações

Similar a Causes of the Growing Conflict Between Privacy and Security

Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx por
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
3 visualizações7 slides
Data Retention Law por
Data Retention LawData Retention Law
Data Retention LawSonia Sanchez
2 visualizações77 slides
Essay On National Security por
Essay On National SecurityEssay On National Security
Essay On National SecurityWrite My Paper For Me Singapore
10 visualizações20 slides
Running Head INTELLIGENCE GATHERING .docx por
Running Head INTELLIGENCE GATHERING                              .docxRunning Head INTELLIGENCE GATHERING                              .docx
Running Head INTELLIGENCE GATHERING .docxwlynn1
8 visualizações7 slides
Patriot Act Outline por
Patriot Act OutlinePatriot Act Outline
Patriot Act OutlineShannon Olsen
2 visualizações38 slides
The Foreign Intelligence Surveillance Act (FISA) por
The Foreign Intelligence Surveillance Act (FISA)The Foreign Intelligence Surveillance Act (FISA)
The Foreign Intelligence Surveillance Act (FISA)Kelly Ratkovic
3 visualizações77 slides

Similar a Causes of the Growing Conflict Between Privacy and Security(20)

Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx por toltonkendal
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
toltonkendal3 visualizações
Data Retention Law por Sonia Sanchez
Data Retention LawData Retention Law
Data Retention Law
Sonia Sanchez2 visualizações
Running Head INTELLIGENCE GATHERING .docx por wlynn1
Running Head INTELLIGENCE GATHERING                              .docxRunning Head INTELLIGENCE GATHERING                              .docx
Running Head INTELLIGENCE GATHERING .docx
wlynn18 visualizações
Patriot Act Outline por Shannon Olsen
Patriot Act OutlinePatriot Act Outline
Patriot Act Outline
Shannon Olsen2 visualizações
The Foreign Intelligence Surveillance Act (FISA) por Kelly Ratkovic
The Foreign Intelligence Surveillance Act (FISA)The Foreign Intelligence Surveillance Act (FISA)
The Foreign Intelligence Surveillance Act (FISA)
Kelly Ratkovic3 visualizações
Foreign Intelligence Surveillance Act Pros And Cons por April Watson
Foreign Intelligence Surveillance Act Pros And ConsForeign Intelligence Surveillance Act Pros And Cons
Foreign Intelligence Surveillance Act Pros And Cons
April Watson2 visualizações
Essay About The Not So Patriot Act por Victoria Dillard
Essay About The Not So Patriot ActEssay About The Not So Patriot Act
Essay About The Not So Patriot Act
Victoria Dillard3 visualizações
CyberTerrorismACaseOfAliceInWonderland por Enrique J Cordero
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero131 visualizações
American Civil Liberties Are NOT Violated By The Patriot Act por Camella Taylor
 American Civil Liberties Are NOT Violated By The Patriot Act American Civil Liberties Are NOT Violated By The Patriot Act
American Civil Liberties Are NOT Violated By The Patriot Act
Camella Taylor2 visualizações
The Importance Of Civil Liberties por Lucy Castillo
The Importance Of Civil LibertiesThe Importance Of Civil Liberties
The Importance Of Civil Liberties
Lucy Castillo2 visualizações
Cyber Espionage The Silent Crime of Cyberspace Virginia G por OllieShoresna
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
OllieShoresna5 visualizações
The Security Agency Nsa ( Nsa ) por Connie Ripp
The Security Agency Nsa ( Nsa )The Security Agency Nsa ( Nsa )
The Security Agency Nsa ( Nsa )
Connie Ripp3 visualizações
150 word agree or disagree This week we are asked to evaluate .docx por drennanmicah
150 word agree or disagree This week we are asked to evaluate .docx150 word agree or disagree This week we are asked to evaluate .docx
150 word agree or disagree This week we are asked to evaluate .docx
drennanmicah2 visualizações
Patriot Act Benefits por Amanda Marie
Patriot Act BenefitsPatriot Act Benefits
Patriot Act Benefits
Amanda Marie2 visualizações
1984 Personal Privacy Analysis por Alison Carias
1984 Personal Privacy Analysis1984 Personal Privacy Analysis
1984 Personal Privacy Analysis
Alison Carias2 visualizações
Fourth Amendment Violations por Candace Daigle
Fourth Amendment ViolationsFourth Amendment Violations
Fourth Amendment Violations
Candace Daigle4 visualizações
NSA Persuasive Essay por Jill Lyons
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
Jill Lyons2 visualizações
The Right To Privacy Via Electronic Transmissions Essay por Susan Tullis
The Right To Privacy Via Electronic Transmissions EssayThe Right To Privacy Via Electronic Transmissions Essay
The Right To Privacy Via Electronic Transmissions Essay
Susan Tullis2 visualizações

Último

Empathic Computing: Delivering the Potential of the Metaverse por
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the MetaverseMark Billinghurst
476 visualizações80 slides
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ... por
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation
25 visualizações9 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
257 visualizações86 slides
Uni Systems for Power Platform.pptx por
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
55 visualizações21 slides
Report 2030 Digital Decade por
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital DecadeMassimo Talia
15 visualizações41 slides
Scaling Knowledge Graph Architectures with AI por
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AIEnterprise Knowledge
28 visualizações15 slides

Último(20)

Empathic Computing: Delivering the Potential of the Metaverse por Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst476 visualizações
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software257 visualizações
Uni Systems for Power Platform.pptx por Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.55 visualizações
Report 2030 Digital Decade por Massimo Talia
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital Decade
Massimo Talia15 visualizações
Scaling Knowledge Graph Architectures with AI por Enterprise Knowledge
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AI
Enterprise Knowledge28 visualizações
1st parposal presentation.pptx por i238212
1st parposal presentation.pptx1st parposal presentation.pptx
1st parposal presentation.pptx
i2382129 visualizações
ChatGPT and AI for Web Developers por Maximiliano Firtman
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman187 visualizações
Black and White Modern Science Presentation.pptx por maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291616 visualizações
Web Dev - 1 PPT.pdf por gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet60 visualizações
Spesifikasi Lengkap ASUS Vivobook Go 14 por Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang37 visualizações
HTTP headers that make your website go faster - devs.gent November 2023 por Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn21 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker33 visualizações
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 visualizações
Microsoft Power Platform.pptx por Uni Systems S.M.S.A.
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptx
Uni Systems S.M.S.A.52 visualizações
Java Platform Approach 1.0 - Picnic Meetup por Rick Ossendrijver
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver27 visualizações
SAP Automation Using Bar Code and FIORI.pdf por Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP22 visualizações
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! por sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 visualizações
Melek BEN MAHMOUD.pdf por MelekBenMahmoud
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdf
MelekBenMahmoud14 visualizações

Causes of the Growing Conflict Between Privacy and Security

  • 1. Donald M. Edwards, CISSP, CCNA https://www.linkedin.com/in/dmedwards Image courtesy of the Electronic Frontier Foundation. Original can be found here: https://commons.wikimedia.org/wiki/File:International_justice_and_privacy.jpg CAUSES  OF  THE  GROWING   CONFLICT  BETWEEN   PRIVACY  AND  SECURITY  
  • 2. Causes of the Growing Conflict between Privacy and Security 1 The struggle of maintaining an acceptable level of individual privacy is inherent in any society which values group protection from both internal and external threats. In order to understand the fundamental conflict between privacy and security, one must first understand that absolute group security requires visibility into and control over internal affairs; this visibility and control extends to the affairs of outside groups with threat capabilities as well. In contrast, absolute personal privacy requires that individuals be able to conduct their affairs without observation or interference from others. While it is normal for there to be occasional shifting of the balance between privacy and security, that shift is typically gradual. However, there are circumstances in which the balance swings abruptly toward security, usually when conflict erupts and the relative importance of crime prevention supersedes that of individual privacy. The conflict between security and privacy is becoming more intense because law enforcement’s desire and capability to capture and assimilate large amounts of surveillance data is increasing the ease with which individuals’ privacy can be violated. The conflict between security and privacy occurs because of law enforcement’s needs to identify threat actors before crimes are committed, to detect crimes quickly and in their early stages and to gather sufficient evidence to attribute crimes to those who perpetrate them. Motivation for Privacy Infringement Speaking generally, each of these historical examples of the government’s limiting privacy guarantees in the United States were done in the name of preventing internal threat actors from inflicting significant damage. However, a more detailed look at the privacy- infringing measures reveals three primary advantages being sought by law enforcement:
  • 3. Causes of the Growing Conflict between Privacy and Security 2 Potential Threat Actor Identification The Holy Grail of law enforcement is to identify those who intend to commit a crime before they have an opportunity to act. In order to do that, law enforcement investigators must be able to examine the behavior of everyone with means, motive and opportunity to be a threat. Thanks to radio and other widely-available communication technology, means and opportunity have had few limits since the beginning of the 20th century. As a result, law enforcement is forced to search for people giving an indication of having strong enough motive to represent a threat. Both actively interviewing potential threat actors and passively monitoring their personal communications represent violations of privacy, but are these violations are necessary in order to identify individuals with motive before they take any action. It was precisely that motive which prompted Congress to pass the Trading with the Enemy Act of 1917 six months after the United States entered into World War I. German- Americans were widely suspected of harboring secret loyalties to Germany. The Act included provisions that allowed the government to intercept and read correspondence between the United States and any foreign country during times of war (Sweeney, 2001), despite the fact that just 40 years previously the Supreme Court had ruled, “No law of Congress can place in the hands of officials connected with the postal service any authority to invade the secrecy of letters and such sealed packages in the mail” (U.S. Government Printing Office, 1893). Event Early Detection Serious crimes are seldom limited to an individual act. Instead, most major crimes require a great deal of careful planning and many steps performed over a period of time. By examining potential threat actors’ behavior, it may be possible to identify a crime in progress before the full
  • 4. Causes of the Growing Conflict between Privacy and Security 3 plan is carried out. For example, the Oklahoma City bombing in 1995 could possibly have been prevented if law enforcement had noticed that the bombers had rented a large truck and were purchasing large amounts of fertilizer in multiple transactions, despite the fact that they had no legitimate use for it (Mark E. Koltko-Rivera, 2004). Attribution After a crime is committed, law enforcement faces a significant challenge in piecing together enough information to establish who was involved. In some types of crimes, such as those involving physical violence, trace evidence is often left behind which can be used to help identify the culprit. Many other crimes, however, leave no traces without some form of active surveillance that records everyone’s actions to be examined in later investigation. Basis of Growing Privacy Concerns The most extreme suspension of privacy rights in U.S. history came in the wake of the September 11, 2001 terrorist attacks. Shortly after the attacks, Congress enacted the USA PATRIOT Act, which included provisions allowing warrantless domestic surveillance (Ahn, 2014), enabling the government to keep records on every electronic communication in the United States. The acts of surveillance and keeping records are not necessarily privacy-infringing themselves. Financial records, transaction histories and access logs, for example, are commonly kept for essential purposes that are generally understood and accepted. However, when these types of information are connected with other information or put to uses other than the ones for which they were collected, privacy concerns are raised. Thanks to continuing advances in computing power and data storage, it is now possible to store and easily correlate staggering amounts of data which, when used appropriately, are a powerful tool for law enforcement. However, as more information is collected and easily
  • 5. Causes of the Growing Conflict between Privacy and Security 4 associated, the potential for error and abuse rises dramatically because of the ease with which it can be accessed by those who possess it. For examples of these kinds of privacy violations, we need only look as far as the National Security Agency’s own oversight reports that give details of thousands of privacy violations discovered during internal records audits (National Security Agency, 2014). Conclusion Surveillance and record keeping can be extremely powerful tools that can help law enforcement maintain the security of the nation and its citizens. Like all powerful tools, however, they can be easily misused by someone with the means, motive and opportunity to do so. When used properly and for legitimate investigations, the collected information represents no threat to privacy. However, because of the sheer volume of data and the ease with which it can be accessed improperly, the threat to the right to privacy is significant and growing at the same pace as the utility of that data to law enforcement. The enduring irony of collecting data to identify people with malevolent motives is that in doing so it raises questions about the motives of law enforcement itself.
  • 6. Causes of the Growing Conflict between Privacy and Security 5 References Ahn, J. (2014). Seizure of Electronic Data under the USA PATRIOT Act. Law School Student Scholarship. Deno, F., Diaz, C., Lliguicota, C., Norman, D., & González, R.-O. (2014). TSA SCREENING PROCEDURES: A THREAT TO PRIVACY. International Journal of Arts & Sciences. Mark E. Koltko-Rivera, P. (2004). Detection of Terrorist Preparations by an Artificial Intelligence Expert System Employing Fuzzy Signal Detection Theory. Retrieved from Defense Technical Information Center: http://www.dtic.mil/cgi- bin/GetTRDoc?AD=ADA460204 National Security Agency. (2014). NSA Reports to the President's Intelligence Oversight Board (IOB). Smyth, D. J. (2008). Freedom of the Press and National Security in Four Wars: World War I, World War II, the Vietnam War, and the War on Terrorism. Sweeney, M. S. (2001). Secrets of Victory: The Office of Censorship and the American Press and Radio in World War II. U.S. Government Printing Office. (1893). Postal Laws and Regulations of the United States of America.