The Question of Internet Privacy and Security. Student

Total Page:16

File Type:pdf, Size:1020Kb

The Question of Internet Privacy and Security. Student Committee: Security Council Issue: The Question of Internet Privacy and Security. Student Officer: Youssif Osama Salama - Chair I- Introduction Whether one considers Edward Snowden a hero or traitor he is nonetheless responsible for leaking some of the most confidential information in the history of the USA. These leaks are groundbreaking evidence showing that the US is not only spying on its enemies but also on its allies and its own citizens. This massive leakage of confidential information has tainted the US’s relation with the world’s global powers. But were this actions by the US government well justified? Well, it’s up to you as a delegate to decide. The US is not the only nation that is guilty of such acts nations such as China, Russia, and Iran are widely considered to have committed similar, if not worse actions. II- Involved Countries and Organizations [United States of America] The mass surveillance disclosures of 2013 have proven that the US government has not only been monitoring internet usage regularly in countries such as Egypt, Iran, Pakistan, Russia, and China, but has also been monitoring internet usage by its very own citizens, its allies, and the United Nations. The NSA, National Security Agency, is the US intelligence organization that is responsible for these mass infringements upon citizen’s privacy and freedom of speech. The NSA gathered its information through the use of the following main surveillance programs: PRISM: Through this program the NSA was able to cooperate with internet companies such as, Google, Microsoft, Apple, and Facebook, to collect and gain boundless access to information about all users from these companies servers. Drop Mire: This program specifically targeted the collection of data about diplomats and embassies, even those of the Five Eyes Alliance. The Map below shows which nations were most affected by NSA data collection and surveillance programs, with green being the lowest level and red being the highest. 1 [Peoples Republic of China] The internet is heavily censored by the Chinese government, leaving Chinese internet users with little to no privacy in their usage of the internet. This major censorship and internet monitoring program was launched in 1998, only 4 years after the advent of the internet in china. The program was nicknamed “The Great Firewall of China,” in reference to how China was isolated culturally and politically due to the presence of the Great Wall of China and drawing parallels to that and how isolated China currently is from the rest of the global internet network. In 1998, the Chinese government launched a huge project to be able to easily censor and monitor the internet. According to Section Five of the Computer Information Network and Internet Security, Protection, and Management Regulations approved by the Chinese State Council on 11 December 1997: No unit or individual may use the Internet to create, replicate, retrieve, or transmit the following kinds of information:- 1. Inciting to resist or breaking the Constitution or laws or the implementation of administrative regulations; 2. Inciting to overthrow the government or the socialist system; 3. Inciting division of the country, harming national unification; 4. Inciting hatred or discrimination among nationalities or harming the unity of the nationalities; 5. Making falsehoods or distorting the truth, spreading rumors, destroying the order of society; 6. Promoting feudal superstitions, sexually suggestive material, gambling, violence, murder; 7. Terrorism or inciting others to criminal activity; openly insulting other people or distorting the truth to slander people; 8. Injuring the reputation of state organizations; 9. Other activities against the Constitution, laws or administrative regulations. [European Union] Recent leaks by Edward Snowden have revealed that the NSA has not only been spying on countries such as Iran and China, but it has also been caught spying on many of its European Allies. The fact that the NSA has tapped into German Chancellor Angela Merkel’s phone has sent shockwaves throughout Europe. Merkel has even gone to the extent of claiming that this intrusive act may lead to the “straining of transatlantic ties.” Merkel’s phone has been bugged since 2002, several years before Merkel was the Chancellor of Germany. The leaks have also revealed that the NSA has tapped into 70.3 million phone calls in France between 10 December, 2012 and 8 January, 2013. "President [Obama] made clear that the United States has begun to review the way that we gather intelligence, so that we properly balance the legitimate security concerns of our citizens and allies with the privacy concerns that all people share." – Statement by the White House, After French President Hollande’s phone call with President Obama. “This type of practice between partners that intrudes on the private sphere is totally unacceptable…We have to see to it very quickly that this practice ceases.” - Laurent Fabius, French Foreign Minister Despite the above allegations, many European nations are far from innocent. NSA leaks have disclosed that several nations such as, Germany, France, Spain, and Sweden have worked closely with the British GCHQ in programs similar to those conducted by the NSA, including mass surveillance of the internet and telephone lines. The US Spy 2 Chief, James Clapper, has claimed that “some of the information referenced in documents leaked by Snowden was provided to the NSA by foreign partners.” III- Focused Overview of the Issue Delegates must focus on finding a key balance between privacy and security of one’s nation, if there is any. An increased amount of security will limit citizens freedom of speech and privacy, while a decrease in invasive security measures will lead to more freedom but it may allow for criminals to thrive. One must also take into consideration that the citizens of ones nation will strongly oppose any compromise their freedom of speech on the internet. Several treaties like SOPA, PIPA, and ACTA have failed miserably due to citizens putting pressure on their governments in order to oppose the implementation of any law that will infringe upon their rights and self-determination. IV- Key Vocabulary Privacy: The state of being free from intrusion or disturbance in one's private life or affairs Security: Precautions taken to guard against crime, attack, sabotage, espionage, etc.: Freedom from danger, risk, etc.; safety. Surveillance: Close observation or supervision maintained over a person, group, etc, especially one in custody or under suspicion Five Eyes Alliance: Is an alliance between the UK, US, Canada, New Zealand, and Australia in order to share secret intelligence information, and to prohibit the act of spying upon each other. Despite this agreement, it has been revealed that the US has been monitoring the internet usage of some of these nations. ITU: ITU (International Telecommunication Union) is the United Nations specialized agency for information and communication technologies. Boundless Informant: “The NSA's internal analytics tool, which allows them to monitor activity on a country by country basis and program by program basis,” thus allowing for easy representation of the data collected graphically. http://goo.gl/blAENm V- Important Events & Chronology Please write a timeline concerning the conflict. Make sure that it is detailed and includes all of the essential dates. 3 Date (Day/Month/Year) Event 23 January 1996 First Internet Regulation Law Passed By Chinese State Council October 2006 Iranian Government Limits Internet Speeds To Only 128 Kb/S 6 June 2013 Documents Leaked By Snowden VI- Past Resolutions and Treaties - HRC 20th Session- Agenda Item 3: http://www.regeringen.se/content/1/c6/19/64/51/6999c512.pdf - WIPO Copyright Treaty VII- Failed Solution Attempts The World Conference on International Telecommunications 2012: This conference was aimed at addressing the question of regulating the internet. It was heavily opposed by nations such as the USA, India, and the European Union. SOPA PIPA and ACTA: All three treaties were aimed at an increase in the amount of regulation of the internet. All three treaties were heavily opposed by the citizens of several nations and have also been opposed by several internet corporations such as, Google, Yahoo, and Facebook. VIII- Possible Solutions - Regulation of the Internet. - Advocating an increase in internet user privacy. IX- Useful Links http://www.theguardian.com/world/the-nsa-files http://articles.washingtonpost.com/keyword/national-intelligence http://www.techdirt.com/articles/20121214/14133321389/who-signed-itu-wcit-treaty-who-didnt.shtml http://www.theguardian.com/technology/2012/dec/14/telecoms-treaty-internet-unregulated http://www.forbes.com/sites/parmyolson/2012/12/13/the-dark-side-of-tomorrows-internet-treaty/ http://www.washingtonpost.com/opinions/charles-lane-nsas-spying-humiliates-germany- again/2013/11/04/f13eba14-456d-11e3-b6f8-3782ff6cb769_story.html Videos: https://www.youtube.com/watch?v=I3IbBzujtDc 4 https://www.youtube.com/watch?v=kaRvzQ887HM X- Works Cited http://www.theguardian.com/world/2013/jun/30/nsa-leaks-us-bugging-european-allies http://www.ctvnews.ca/politics/u-k-reaction-to-nsa-leaks-may-have-chilling-effect-european-rights-group- 1.1422027 http://www.theguardian.com/world/2013/jun/10/nsa-spying-scandal-what-we-have-learned https://en.wikipedia.org/wiki/Internet_censorship_in_the_People's_Republic_of_China https://en.wikipedia.org/wiki/Internet_privacy https://en.wikipedia.org/wiki/Internet
Recommended publications
  • Through a PRISM, Darkly(PDF)
    NANOG 59 – October 7, 2013 Through a PRISM, Darkly Mark Rumold Staff Attorney, EFF NANOG 59 – October 7, 2013 Electronic Frontier Foundation NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 What we’ll cover today: • Background; what we know; what the problems are; and what we’re doing • Codenames. From Stellar Wind to the President’s Surveillance Program, PRISM to Boundless Informant • Spying Law. A healthy dose of acronyms and numbers. ECPA, FISA and FAA; 215 and 702. NANOG 59 – October 7, 2013 the background NANOG 59 – October 7, 2013 changes technologytimelaws …yet much has stayed the same NANOG 59 – October 7, 2013 The (Way) Background • Established in 1952 • Twin mission: – “Information Assurance” – “Signals Intelligence” • Secrecy: – “No Such Agency” & “Never Say Anything” NANOG 59 – October 7, 2013 The (Mid) Background • 1960s and 70s • Cold War and Vietnam • COINTELPRO and Watergate NANOG 59 – October 7, 2013 The Church Committee “[The NSA’s] capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything. Telephone conversations, telegrams, it doesn't matter. There would be no place to hide.” Senator Frank Church, 1975 NANOG 59 – October 7, 2013 Reform • Permanent Congressional oversight committees (SSCI and HPSCI) • Foreign Intelligence Surveillance Act (FISA) – Established requirements for conducting domestic electronic surveillance of US persons – Still given free reign for international communications conducted outside U.S. NANOG 59 – October 7, 2013 Changing Technology • 1980s - 2000s: build-out of domestic surveillance infrastructure • NSA shifted surveillance focus from satellites to fiber optic cables • BUT: FISA gives greater protection for communications on the wire + surveillance conducted inside the U.S.
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • George Thorley Class 12 Project
    SURVEILLANCE !1 Surveillance Watch The Many, To Catch The Few George J. Thorley Norwich Steiner School Author Note George J. Thorley, Level 3 Steiner School Certificate, Norwich Steiner School. This report is the piece of work required for the Steiner School Certificate Level 3 Class 12 Project. Correspondence concerning this report should be addressed to George Thorley, Norwich Steiner School, Hospital Lane, Norwich, NR1 2HW. Contact: [email protected] 11 - 05 - 2017 SURVEILLANCE !2 Contents Title 1 Summary 3 Introduction 4 Historical Context 5 9/11 7 USA PATRIOT Act 2001 8 Presidents Surveillance Program 10 The Timeline 12 Edward J Snowden 16 Prism 17 Tempora 20 Treasure Map 21 Conclusion 23 Diagrams 26 References 27 11 - 05 - 2017 SURVEILLANCE !3 Summary In this report, my main question will be: What was the extent of government mass surveillance, in particular the NSA in the United States, running from the September 11 attacks in 2001, to the Edward Snowden revelations in 2013? In answering this I will focus on how public and political feelings prompted the conditions possible for the security forces to be doing what they do in todays world. In particular, I will be looking at the National Security Agency (NSA) in the United States (US) and some of the revelations brought forward by Edward Snowden in 2013, along with the scale of involvement of the United Kingdom’s (UK) Government Communication Headquarters (GCHQ). I will then look at some of the fundamental questions that surround the world of mass surveillance, such as the effectiveness of the programs that were acted upon by security agencies, who they were really looking for, and whether, in my eyes, their methods were morally right.
    [Show full text]
  • Review Group on Global Signals Intelligence Collection and Communications Technologies From
    To: Review Group on Global Signals Intelligence Collection and Communications Technologies From: Bill of Rights Defense Committee Date: October 4, 2013 Re: Public comment pursuant to September 4 announcement On September 4, 2013, the Review Group on Global Signals Intelligence Collection and Communications Technologies (the “Review Group”) announced an invitation for public comment pursuant to the President’s establishment of the group on August 12.1 This memorandum is presented for submission “as part of the official record of the Review Group’s activity.” 1. Introduction The United States has long pursued data collection as part of its national security program. Recent revelations that the National Security Agency (NSA) has turned its substantial powers towards spying on American citizens—en masse, without suspicion— have raised serious and troubling constitutional questions.2 The first public details regarding the scope of the NSA’s domestic spying program came to light despite active efforts across the executive branch to suppress them.3 In the wake of leaks by NSA subcontractor Edward Snowden, Americans—including members of Congress—have voiced widespread outrage about how the NSA’s activities render them presumptive suspects, without transparent debate.4 The disclosures finally enabled a long 1 See Office of the Director of National Intelligence, Review Group on Global Signals Intelligence Collection and Communications Technologies Seeks Public Comment, (Sep. 4, 2013), available at http://icontherecord.tumblr.com/post/60323228143/review-group-on-global-signals-intelligence; The White House, Presidential Memorandum -- Reviewing Our Global Signals Intelligence Collection and Communications Technologies (Aug. 12, 2013), available at http://www.whitehouse.gov/the-press- office/2013/08/12/presidential-memorandum-reviewing-our-global-signals-intelligence-collec.
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • National Security Agency
    Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies).
    [Show full text]
  • NSA Utah Data Center
    NSA Utah Data Center Background The Utah Data Center, code-named Bumblehive, is the first Intelligence Community Comprehensive National Cyber-security Initiative (IC CNCI) data center designed to support the Intelligence Community's efforts to monitor, strengthen and protect the nation. Our Utah "massive data repository" is designed to cope with the vast increases in digital data that have accompanied the rise of the global network. NSA is the executive agent for the Office of the Director of National Intelligence ( ODNI ) and is the lead agency at the center. The 1.5 billion-dollar one million square-foot Bluffdale / Camp Williams LEED Silver facility houses a 100,000 sq-ft mission critical Tier III data center. The remaining 900,000 SF is used for technical support and administrative space. Our massive twenty building complex also includes water treatment facilities, chiller plants, electric substation, fire pump house, warehouse, vehicle inspection facility, visitor control center, and sixty diesel-fueled emergency standby generators and fuel facility for a 3- day 100% power backup capability. Utah Data Center Administration Building Learn More About Our Secret Surveill- ance Activities In recent months, numerous Top Secret documents have been leaked to the media relating to surveillance activities carried out by our Intelligence Community. In an effort to increase transparency, a new website called " IC OFF THE RECORD " was created to provide the American People immediate, ongoing and direct access to these unauthorized leaks. Click on the Photo Below to View Utah Data Center Up Close at High Resolution Utah Data Center Technical Specifications Data Storage Capacity In February 2012, Utah Governor Gary R.
    [Show full text]
  • Boundless Informant: the NSA's Secret Tool to Track Global Surveillance Data
    http://www.theguardian.com/world/2013/jun/08/ nsa­boundless­informant­global­datamining Boundless Informant: the NSA's secret tool to track global surveillance data Revealed: The NSA's powerful tool for cataloguing global surveillance data – including figures on US collection • Boundless Informant: mission outlined in four slides [1] • Read the NSA's frequently asked questions document [2] Glenn Greenwald and Ewen MacAskill theguardian.com, Tuesday 11 June 2013 09.00 EDT The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). Note the '2007' date in the image relates to the document from which the interactive map derives its top secret classification, not to the map itself. The National Security Agency has developed a powerful tool for recording and analysing where its intelligence comes from, raising questions about its repeated assurances to Congress that it cannot keep track of all the surveillance it performs on American communications. The Guardian has acquired top­secret documents about the NSA datamining tool, called Boundless Informant, that details and even maps by country the voluminous amount of information it collects from computer and telephone networks. The focus of the internal NSA tool is on counting and categorizing the records of communications, known as metadata, rather than the content of an email or instant message. The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US 2 computer networks over
    [Show full text]
  • Whistle-Blowing in the Wind
    ISSN (Online) - 2349-8846 Whistle-blowing in the Wind SRINIVASAN RAMANI, STANLY JOHNY Vol. 48, Issue No. 28, 13 Jul, 2013 Srinivasan Ramani ([email protected]) is Senior Assistant Editor with the Economic and Political Weekly. Stanly Johny ([email protected]) is a journalist based in New Delhi. Only the small nations of Latin America, committed to “Socialism of the 21st century”, stand up to the might of the United States, by offering to provide asylum to whistleblower Edward Snowden. The rest of the world’s state establishments show their inability to defy the US despite great sympathy for Snowden among their citizens (including within the US). In an ideal world, a whistleblower like Edward Snowden – an insider who threw light on the dystopian mass surveillance conducted by the US’ secretive security agencies – would have been regarded as the truth-teller he wanted to be known as. He would have been provided sanctuary by any government that would have been outraged at the US’ intrusive surveillance apparatus. The world’s other nations would have offered sympathy and demanded that the US rollback the programme and Snowden would have been hailed for his catalytic efforts. In the real world that is clearly dominated by a lone superpower to which every other nation regardless of standing or power has some entwined interest related relationship, Snowden is a headache for the state establishments. With the US cancelling his passport, pressing criminal charges and seeking to imprison Snowden, the state establishments elsewhere - irrespective of being the US’ formal allies (and are invariably targets of the NSA’s surveillance) – have been coy with regards the question of his asylum.
    [Show full text]
  • GOVERNMENT SPONSORED BLACKMAIL? Mass Surveillance and the Threat to Personal Privacy Ben Woodfinden
    1st Place Essay Contest Winner Undergraduate Category GOVERNMENT SPONSORED BLACKMAIL? Mass Surveillance and the Threat to Personal Privacy Ben Woodfinden CANADIAN STUDENT REVIEW WINTER 2016 13 dward Snowden is a No. 755 at 227-230 (1976)). Every polarizing figure. Yet even presidential administration since his detractors must concede Franklin Roosevelt’s has made use of Ethat the information he disclosed the state apparatus to spy on political about the surveillance operations opponents (Downs, 2013, June 14). In of the US National Security Agency the early 1970s, a series of scandals (NSA) and other security agencies involving American intelligence worldwide have led to an important agencies shook public trust in the US public discussion on surveillance and government. Between 1968 and 1975, civil liberties in the post-9/11 world. public trust in government dropped from 61% to 36% (Pew Research Centre, 2014). As a result, Congress Snowden’s disclosures have initiated the Church Committee raised a series of important in 1975 to investigate American intelligence gathering in the wake of legal, philosophical, and political these revelations (Senate Historical questions. Office, 1975). Snowden’s disclosures have The final Church Committee raised a series of important report, published in 1976, revealed legal, philosophical, and political widespread and systematic abuses questions. Do mass surveillance of power (Senate Select Committee, programs actually keep us safer? No. 755 at 16-17 (1976)). On multiple More fundamentally, can we trust occasions, the CIA, FBI, and NSA the government not to misuse the violated the fundamental rights of information it gains through mass peaceful American citizens. One surveillance? In the United States, specific example is worth highlighting.
    [Show full text]
  • Submission to Senate Legal and Constitutional Affairs Standing Committee Inquiry on Comprehensive Revision of Telecommunications (Interception and Access) Act 1979
    Submission to Senate Legal and Constitutional Affairs Standing Committee Inquiry on Comprehensive Revision of Telecommunications (Interception and Access) Act 1979 This submission is based entirely upon publicly available sources. The list of appendices at the back does not appear in order of mention. Appendices are accessible via control/click from the text. Some surveillance programs are not named but shown as eg. A-redact Contents Introduction..............................................................................................................4 Programs...................................................................................................................8 Operating bases in Australia...................................................................................8 National legislation on surveillance ............................................................................8 UKUSA and people ..................................................................................................9 Monitoring agencies in Australia which have an impact on human rights and privacy.....................................................................................................................11 Queries to our watchdogs ......................................................................................11 Emanation security ................................................................................................11 Legislative protections for citizens ...........................................................................11
    [Show full text]
  • Edwards CX Debate Topic Analysis Part 1D
    Surveillance Topic Terms, p. 1 TERMS IN USE ON THE SURVEILLANCE TOPIC Dr. Rich Edwards Professor of Communication Studies Baylor University American Community Survey (ACS): This subset of the U.S. Census asks intrusive questions such as the number of times a person has been married, whether they have a mortgage on their home and whether they are enrolled in a health care plan. The ACS selects a sample size of about 2.5 percent of households each year to complete the survey. The ACS is controversial not only because of its intrusiveness, but also because participation is mandatory – the federal government reportedly pursues participants with phone calls, visits and threats of jail time if they refuse to complete the form. Automated Biometric Identification System (IDENT): This is the name given to the U.S. Department of Homeland Security’s system for storing the fingerprints and facial recognition data for persons applying for visas, immigration benefits and the Visa Waiver Program (VWP). The system also stores biometric data for suspected terrorists and immigration law violators. Big Data Research and Development Initiative: The Obama administration launched this program in 2012, providing about $200 million with the announced purpose of “transforming our ability to use Big Data for scientific discovery, environmental and biomedical research, education and national security.” Six federal agencies are involved in the initiative, led by the Defense Advanced Research Projects Agency (DARPA) – the same agency that created the controversial Total Information Awareness program. Biometrics: This term refers to the use for identification purposes of any of the persistent characteristics of the human body.
    [Show full text]