Panopticon – Surveillance and Privacy in the Internet Age

Total Page:16

File Type:pdf, Size:1020Kb

Panopticon – Surveillance and Privacy in the Internet Age Sequence Number: FJL-LAK1 Panopticon – Surveillance and Privacy in the Internet Age February 27, 2009 Michael Walter-Echols Approved: ______________________________________ F. J. Looft, Professor and Head Electrical and Computer Engineering An Interactive Qualifying Project Report submitted to the Faculty of WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Bachelor of Science Abstract The right to privacy has been central to democratic society since its inception. In turbulent times, the desire for enhanced national security is often seen to trump an individual’s right to privacy. Along with laws permitting expanded government control over the lives of its people, technology has increased the potential for surveillance of the average citizen. This project reviews the concept of privacy rights and the history of privacy. Secondly, it examines the changes to privacy rights that have occurred due to recent events, and evaluate if any significant enhancement to security is thereby achieved. Finally, it provides recommendations on how personal and public security can be enhanced while remaining sensitive to privacy considerations. 2 Table of Contents Abstract.................................................................................................................................................2 Chapter 1: Introduction........................................................................................................................5 Introduction......................................................................................................................................5 Impact of Technology..................................................................................................................5 Definition of Terms...........................................................................................................................6 What is Privacy?..........................................................................................................................6 What is Security?.........................................................................................................................6 Why does privacy matter?................................................................................................................7 Summary...........................................................................................................................................7 Chapter 2: Overview of Privacy Law...................................................................................................9 Privacy and U.S. Law.......................................................................................................................9 U.S. Constitution..........................................................................................................................9 Fourth Amendment..................................................................................................................9 Fifth Amendment...................................................................................................................11 Fourteenth Amendment.........................................................................................................11 Tort Law.....................................................................................................................................12 Privacy Act of 1974...................................................................................................................13 Health Insurance Portability and Accountability Act.................................................................14 Changes to U.S. Privacy Law since September 11, 2001...............................................................14 USA PATRIOT Act....................................................................................................................14 FISA and Telecom Immunity.....................................................................................................15 Privacy and European Law.............................................................................................................15 European Convention on Human Rights...................................................................................15 European Directive on Data Protection.....................................................................................16 Chapter 3: Development of Surveillance Technology........................................................................19 History............................................................................................................................................19 Slave Passes...............................................................................................................................19 Photography...............................................................................................................................21 Biometrics..................................................................................................................................22 Digital Surveillance...................................................................................................................25 State of the Art................................................................................................................................28 Data Mining...............................................................................................................................29 Total Information Awareness.................................................................................................30 CCTV.........................................................................................................................................31 Wiretapping................................................................................................................................32 Data Surveillance: Wiretapping the Internet.........................................................................33 RFID..........................................................................................................................................36 Conclusion......................................................................................................................................37 Chapter 4: Present and Future Trends................................................................................................39 The Value of Information................................................................................................................39 Present Trends.................................................................................................................................39 Social Control............................................................................................................................40 Marketing...................................................................................................................................41 Social Networking.................................................................................................................42 3 Google...................................................................................................................................43 Projected Developments.................................................................................................................44 Private........................................................................................................................................44 Commercial................................................................................................................................45 Political......................................................................................................................................45 Conclusion......................................................................................................................................46 Chapter 5: Recommendations and Conclusion..................................................................................47 Introduction....................................................................................................................................47 Public Policy..............................................................................................................................47 Constitutional Amendment for Privacy.................................................................................47 Private Actions...........................................................................................................................48 Encryption Everywhere.........................................................................................................48 Conclusion......................................................................................................................................49 References...........................................................................................................................................51 4 1. Introduction Introduction The principles laid down... affect the very essence of constitutional liberty and security. ...They apply to all invasions on the part of the government and its employees of the sanctity of a man’s home and the privacies of life. It is not the breaking of his doors, and the rummaging of his drawers, that constitutes the essence of the offence;
Recommended publications
  • Identity Theft Literature Review
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Identity Theft Literature Review Author(s): Graeme R. Newman, Megan M. McNally Document No.: 210459 Date Received: July 2005 Award Number: 2005-TO-008 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. IDENTITY THEFT LITERATURE REVIEW Prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement January 27-28, 2005 Graeme R. Newman School of Criminal Justice, University at Albany Megan M. McNally School of Criminal Justice, Rutgers University, Newark This project was supported by Contract #2005-TO-008 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S.
    [Show full text]
  • Anonymity and Encryption in Digital Communications, February 2015
    Submission to the UN Special Rapporteur on freedom of expression – anonymity and encryption in digital communications, February 201 1! Introduction Privacy International submits this information for the Special Rapporteur's report on the use of encryption and anonymity in digital communications. Anonymity and the use of encryption in digital communications engage both the right to freedom of expression and right to privacy very closely: anonymity and encryption protects privacy, and ithout effective protection of the right to privacy, the right of individuals to communicate anonymously and ithout fear of their communications being unla fully detected cannot be guaranteed. As noted by the previous mandate holder, !rank #aRue, $the right to privacy is essential for individuals to express themselves freely. Indeed, throughout history, people%s illingness to engage in debate on controversial sub&ects in the public sphere has al ays been linked to possibilities for doing so anonymously.'( Individuals' right to privacy extends to their digital communications.) As much as they offer ne opportunities to freely communicate, the proliferation of digital communications have signi*cantly increased the capacity of states, companies and other non+state actors to interfere ith individual's privacy and free expression. Such interference ranges from mass surveillance of communications by state intelligence agencies, to systematic collection and storage of private information by internet and telecommunication companies, to cybercrime. Anonymity and encryption are essential tools available to individuals to mitigate or avert interferences ith their rights to privacy and free expression. In this ay, they are means of individuals exercising to the fullest degree their rights hen engaging in digital communications.
    [Show full text]
  • Privacy on the Internet: the Vole Ving Legal Landscape Debra A
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Santa Clara University School of Law Santa Clara High Technology Law Journal Volume 16 | Issue 2 Article 10 January 2000 Privacy on the Internet: The volE ving Legal Landscape Debra A. Valentine Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Debra A. Valentine, Privacy on the Internet: The Evolving Legal Landscape , 16 Santa Clara High Tech. L.J. 401 (2000). Available at: http://digitalcommons.law.scu.edu/chtlj/vol16/iss2/10 This Symposium is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. PRIVACY ON THE INTERNET: THE EVOLVING LEGAL LANDSCAPE Prepared Remarks of Debra A. Valentinet TABLE OF CONTENTS I. Introduction ................................................................................ 401 II. Privacy on the Internet-The Evolving Legal Landscape ............. 403 A. Federal Trade Commission Act and Informational Privacy ........... 404 B. Other Federal Statutes and Informational Privacy ......................... 408 C. Federal Intemet-Law ................................................................... 410 III. Current Federal Policy on Internet Privacy .................................. 412 IV. The U.S. Approach
    [Show full text]
  • Personality Rights in Australia1
    SWIMMERS, SURFERS, AND SUE SMITH PERSONALITY RIGHTS IN AUSTRALIA1 Therese Catanzariti2 It is somewhat of a misnomer to talk about personality rights in Australia. First, personality rights are not “rights” in the sense of positive rights, a right to do something, or in the sense of proprietary rights, property that can be assigned or mortgaged. Second, personality rights are largely a US law concept, derived from US state law relating to the “right of publicity”. However, it is common commercial practice that Australian performers, actors and sportstars enter endorsement or sponsorship agreements.3 In addition, the Australian Media and Entertainment Arts Alliance, the Australian actors union, insists that the film and television industrial agreements and awards don’t cover merchandising and insist film and television producers enter individual agreements if they want to use an actor’s image in merchandising.4 This paper considers Australian law5 relating to defamation, passing off, and section 52 of the Trade Practices Act,6 draws parallels with US law relating to the right of publicity, and considers whether there is a developing Australian jurisprudence of “personality rights”. Protecting Personality Acknowledging and protecting personality rights protects privacy. But protecting privacy is not the focus and is an unintended incidental. Protecting personality rights protects investment, and has more in common with unfair competition than privacy. Acknowledging and protecting personality rights protects investment in creating and maintaining a carefully manicured public image, an investment of time labour, skill and cash. This includes spin doctors and personal trainers and make-up artists and plastic surgeons and making sure some stories never get into the press.
    [Show full text]
  • E Dawn of Robot Surveillance AI, Video Analytics, and Privacy
    e Dawn of Robot Surveillance AI, Video Analytics, and Privacy June 2019 e Dawn of Robot Surveillance AI, Video Analytics, and Privacy By Jay Stanley © 2019 AMERICAN CIVIL LIBERTIES UNION Cover: Sources images, shutterstock.com “The robots are here. The robots control your warnings. They analyze and notify, following instructions you have set.” — Promotional web site for “Video Surveillance as a Service”1 “The overwhelming majority of images are now made by machines for other machines” 2 — Trevor Paglen 1 http://www.vsaas.com/. 2 https://thenewinquiry.com/invisible-images-your-pictures-are-looking-at-you/. 1 Table of Contents I. INTRODUCTION ...................................................................................................... 3 II. WHAT IS AI VIDEO ANALYTICS .......................................................................... 5 The rise of deep learning ........................................................................................... 6 Overcoming challenges with new sources of data .................................................. 8 III. CURRENT DEPLOYMENTS ................................................................................ 9 Government deployments ......................................................................................... 9 Commercial deployments ........................................................................................ 10 Analytics in the cloud .............................................................................................. 11 IV. HOW COMPUTERS WILL
    [Show full text]
  • REPORTER "Eluding Electronic Servicing
    MAY, 1963 35 CENTS REPORTER "eluding Electronic Servicing Special Equipment Speeds Servicing A...,-`" _.. .., . _ . --:._ Molecular Electronics Explained Resistors With More Than One Job } www.americanradiohistory.com BIG -SYSTEM MUSCLE... _ . u . , . ... : .: : . .- . : . a .,...: .. e : : . ... a . + _.. a ! a . e s s . ! . 1 . ! . e i . 1 . s e e . / . a ' / 11 . / . / s f ! . e . ! ! e s . > . te...... cc..... / a e a a . 1 w . a f i . : / ! . / / . .. - / / . ! ! ! / . .. ....... ................... 18Í . e . .. t a a e + e1V . 7J / Ma/ i Qç } ; , ! a- ir '+4 . +. & ! ,. e ! ' "' ac. 4 .:.a a . SMALL -SYSTEM PRICE! NEW JERROLD TV DISTRIBUTION SYSTEM ENGINEERED FOR THE NEW COLOR -TV ERA Designed for TV shops, dealers' showrooms, The JERROLD "Challenger" Amplifier, small apartments and motels Model ACL-200, delivers 20db minimum gain Feeds up to 32 TV and FM sets over the low band, 19db No controls or adjustments over the high band. New "Quick -Disconnect" plug-in outlets Flat response-unique in a low-price amplifier, but necessary for good color TV. Easy to install, Here's the distribution system to sell to TV and no controls to adjust. Famous JERROLD qual- FM dealers for their color -TV showrooms .. ity is built in to stay. perfect too for the small apartment building or Model ACL-200, $38.97 net motel that's been needing an antenna system See your JERROLD distributor or write but couldn't afford one before. It's also ideal for Jerrold Electronics, Distributor Sales Division, your own service shop. Philadelphia 32, Pa. icz:=;`1 JER RO LO New crown -washer screw Exclusive "Gamma" ELECTRONICS New 4- and 8 -way nigh - terminals for stripped or chassis fittings for quick isolation networks.
    [Show full text]
  • Identity Theft Harms Millions of Americans Every Year. Breaches of Personally Identifiable Information (PII) Across the Governme
    Safeguarding & Handling PI1 Each DOE employee and contractor needs to be aware of their responsibility to- b Encrypt personal information sent via email b protect personal information, b Label Privacy Act protected records "OFFICIAL USE ONLY - PRIVACY ACT b avoid unauthorized disclosures, DATA" b ensure that no records are maintained without Identity theft harms millions of Americans every b Do not collect personal information without proper public notice in the Federal Register, and year. Breaches of personally identifiable information proper authority, and only the minimum (PII) across the government have been well b report immediately, whether confirmed or necessary for carrying out the mission of DOE publicized and costly for individuals and Federal suspected, any breach or misuse of PII. agencies. These breaches have prompted the b Do not place Privacy Act protected data on Administration and Congress to take action to unrestricted shared drives, intranets, or the improve the protection of personal information. Internet For more information on Privacy and protecting PII, refer to DOE Order 206. I, Department of Energy b Report any loss or unauthorized disclosure of As Department of Energy employees and Privacy Program, located on the DOE Directives personal data immediately to your supervisor, contractors, you have a responsibility to protect all website: http://directives.doe.gov/ PII. DOE Order 206. I, Department of Energy Privacy program manager, Information System Security Program, defines PI1 as "any information collected or Manager, or Privacy Act Officer Questions should be referred to your supervisor, your local Privacy Act Officer, or the Privacy Office maintained by the Department about an individual, b Lock your computer whenever you leave your including but not limited to, education, financial at (202) 586-5955.
    [Show full text]
  • Warrantless Workplace Searches of Government
    WARRANTLESS WORKPLACE within which the principles outlined in SEARCHES OF GOVERNMENT O’Connor for “workplace” searches by EMPLOYEES government supervisors can be understood and applied. In sum, when a government supervisor is considering the search of a Bryan R. Lemons government employee’s workspace, a two- Branch Chief part analysis can be utilized to simplify the process. First, determine whether the There are a variety of reasons why employee has a reasonable expectation of a government supervisor might wish to privacy in the area to be searched. If a search a government employee’s reasonable expectation of privacy does workplace. For example, a supervisor exist, then consider how that expectation might wish to conduct a search to locate a can be defeated.2 Before turning to those needed file or document; the supervisor issues, however, it is necessary to first might wish to search an employee’s define exactly what is meant by the term workplace to discover whether the “workplace.” employee is misusing government property, such as a government-owned DEFINING THE “WORKPLACE” computer; or, a supervisor might seek to search an employee’s workplace because “Workplace,” as used in this he has information that the employee is article, “includes those areas and items committing a crime, such as using the that are related to work and are generally Internet to download child pornography. within the employer’s control.”3 This would include such areas as offices, desks, In situations where a public filing cabinets, and computers. However, employer
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Protecting Privacy Under the Fourth Amendment
    Protecting Privacy Under the Fourth Amendment The Fourth Amendment' has explicitly been held to protect personal privacy2 since at least the mid-nineteenth century.3 Experts in many fields, including law, psychology, philosophy and sociology, believe that privacy is vitally important to all human beings,' and the Supreme Court has 1. The Fourth Amendment provides that: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. U.S. CONST. amend. IV. Under the Fourteenth Amendment, the states must comply with the provisions of the Fourth Amendment. Mapp v. Ohio, 367 U.S. 643, 655 (1961). 2. As a constitutional concept, privacy is an elusive yet fundamental value. Although the word "privacy" does not appear in the Constitution, the Supreme Court has recognized a constitutional right to privacy based upon provisions of the First, Third, Fourth, Fifth, and Ninth Amendments and their respective "penumbras." Griswold v. Connecticut, 381 U.S. 479, 484-85 (1965); cf Beaney, The ConstitutionalRight to Privacy in the Supreme Court, 1962 SUP. CT. REV. 212, 215 ("The nearest thing to an explicit recognition of a right to privacy in the Constitution is contained in the Fourth Amendment".) This right to privacy is a "fundamental personal right, emanting 'from the totality of the constitutional scheme.' " Griswold v. Connecticut, 381 U.S. 479, 494 (1965) (Goldberg, J., con- curring) (quoting Poe v.
    [Show full text]
  • The Hidden Costs of Terrorist Watch Lists
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2013 The Hidden Costs of Terrorist Watch Lists Anya Bernstein Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Anya Bernstein, "The Hidden Costs of Terrorist Watch Lists," 61 Buffalo Law Review 461 (2013). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. BUFFALO LAW REVIEW VOLUME 61 MAY 2013 NUMBER 3 The Hidden Costs of Terrorist Watch Lists ANYA BERNSTEIN† INTRODUCTION The No Fly List, which is used to block suspected terrorists from flying, has been in use for years. But the government still appears “stymied” by the “relatively straightforward question” of what people who “believe they have been wrongly included on” that list should do.1 In recent months, courts have haltingly started to provide their own answer, giving some individuals standing to sue to remove their names or receive additional process.2 This step is particularly important as the No Fly List continues † Bigelow Fellow and Lecturer in Law, The University of Chicago Law School. J.D., Yale Law School; Ph.D., Anthropology, The University of Chicago. Thanks to Daniel Abebe, Ian Ayres, Alexander Boni-Saenz, Anthony Casey, Anjali Dalal, Nicholas Day, Bernard Harcourt, Aziz Huq, Jerry Mashaw, Jonathan Masur, Nicholas Parrillo, Victoria Schwartz, Lior Strahilevitz, Laura Weinrib, Michael Wishnie, and James Wooten for helpful commentary.
    [Show full text]
  • What Data Is Best Kept Private and Why?
    What data is best kept private and why? Hi, My name is Catherine Gicheru. I am an ICFJ Knight Fellow and the Director of the African Women Journalism Project, an initiative that works to support, train and mentor women journalists in Africa in covering underreported communities and issues. Last week Arzu Geybulla took you through what online harassment looks like, how to look after your emotional wellbeing and shared resources for psychosocial support. This week, l will be telling you about online privacy...what is it and why it's important. You will learn what information you should or shouldn't share online and how the information you share online can make you vulnerable to online attacks and targeted by bad actors. We shall also share some practical tips on what you can do to protect your privacy online. This week in addition to the videos there will be additional reading materials. I encourage you all to participate in the discussions that we shall be having throughout the week. Thank you for joining me and I look forward to working with you to better understand Online Privacy. I would like to start this second module by quickly talking about how the internet works so that you can better understand what data you share knowingly or unknowingly, and why some information should be kept private. There’s a lot of technical explanations of how the internet works, but the simplest explanation is this, the Internet is a vast, sprawling collection of networks that connect to each other. In fact, the word “Internet” comes from this concept: interconnected networks.
    [Show full text]