Panopticon – Surveillance and Privacy in the Internet Age
Total Page:16
File Type:pdf, Size:1020Kb
Sequence Number: FJL-LAK1 Panopticon – Surveillance and Privacy in the Internet Age February 27, 2009 Michael Walter-Echols Approved: ______________________________________ F. J. Looft, Professor and Head Electrical and Computer Engineering An Interactive Qualifying Project Report submitted to the Faculty of WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Bachelor of Science Abstract The right to privacy has been central to democratic society since its inception. In turbulent times, the desire for enhanced national security is often seen to trump an individual’s right to privacy. Along with laws permitting expanded government control over the lives of its people, technology has increased the potential for surveillance of the average citizen. This project reviews the concept of privacy rights and the history of privacy. Secondly, it examines the changes to privacy rights that have occurred due to recent events, and evaluate if any significant enhancement to security is thereby achieved. Finally, it provides recommendations on how personal and public security can be enhanced while remaining sensitive to privacy considerations. 2 Table of Contents Abstract.................................................................................................................................................2 Chapter 1: Introduction........................................................................................................................5 Introduction......................................................................................................................................5 Impact of Technology..................................................................................................................5 Definition of Terms...........................................................................................................................6 What is Privacy?..........................................................................................................................6 What is Security?.........................................................................................................................6 Why does privacy matter?................................................................................................................7 Summary...........................................................................................................................................7 Chapter 2: Overview of Privacy Law...................................................................................................9 Privacy and U.S. Law.......................................................................................................................9 U.S. Constitution..........................................................................................................................9 Fourth Amendment..................................................................................................................9 Fifth Amendment...................................................................................................................11 Fourteenth Amendment.........................................................................................................11 Tort Law.....................................................................................................................................12 Privacy Act of 1974...................................................................................................................13 Health Insurance Portability and Accountability Act.................................................................14 Changes to U.S. Privacy Law since September 11, 2001...............................................................14 USA PATRIOT Act....................................................................................................................14 FISA and Telecom Immunity.....................................................................................................15 Privacy and European Law.............................................................................................................15 European Convention on Human Rights...................................................................................15 European Directive on Data Protection.....................................................................................16 Chapter 3: Development of Surveillance Technology........................................................................19 History............................................................................................................................................19 Slave Passes...............................................................................................................................19 Photography...............................................................................................................................21 Biometrics..................................................................................................................................22 Digital Surveillance...................................................................................................................25 State of the Art................................................................................................................................28 Data Mining...............................................................................................................................29 Total Information Awareness.................................................................................................30 CCTV.........................................................................................................................................31 Wiretapping................................................................................................................................32 Data Surveillance: Wiretapping the Internet.........................................................................33 RFID..........................................................................................................................................36 Conclusion......................................................................................................................................37 Chapter 4: Present and Future Trends................................................................................................39 The Value of Information................................................................................................................39 Present Trends.................................................................................................................................39 Social Control............................................................................................................................40 Marketing...................................................................................................................................41 Social Networking.................................................................................................................42 3 Google...................................................................................................................................43 Projected Developments.................................................................................................................44 Private........................................................................................................................................44 Commercial................................................................................................................................45 Political......................................................................................................................................45 Conclusion......................................................................................................................................46 Chapter 5: Recommendations and Conclusion..................................................................................47 Introduction....................................................................................................................................47 Public Policy..............................................................................................................................47 Constitutional Amendment for Privacy.................................................................................47 Private Actions...........................................................................................................................48 Encryption Everywhere.........................................................................................................48 Conclusion......................................................................................................................................49 References...........................................................................................................................................51 4 1. Introduction Introduction The principles laid down... affect the very essence of constitutional liberty and security. ...They apply to all invasions on the part of the government and its employees of the sanctity of a man’s home and the privacies of life. It is not the breaking of his doors, and the rummaging of his drawers, that constitutes the essence of the offence;