...witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords Privacy, surveillance, culture, mobile technology, society, ACLU, CMS Introduction The widespread use of mobile phones in the past decades have led to various developments in the...
Words: 7224 - Pages: 29
...Introduction The issue of Intelligence Oversight will only become more important as collection techniques and intelligence requirements are evolving rapidly. Recent news of NSA collection of phone records raises questions of what “collection” is defined as. DoD 5240.1-R defines collection as “Information shall be considered as "collected" only when it has been received for use by an employee of a DoD intelligence component in the course of his official duties. Thus, information volunteered to a DoD intelligence component by a cooperating source would be "collected" under this procedure when an employee of such component officially accepts, in some manner, such information for use within that component. Data acquired by electronic means is "collected"...
Words: 2077 - Pages: 9
...Data Collection and Surveillance Andrew John Martin UNCW Computer Science Department Abstract The purpose of the research is to see if the mass collection and surveillance of U.S citizens legal and ethical. The goal is to have a better understanding of the how data is collected, and the what the Fourth Amendment means. This is done by examining several aspects of the Fourth Amendment, and recent articles on the NSA. Upon examination, it becomes clear that the NSA is indeed breaching the rights of lawful U.S citizens. Through showing that the Fourth Amendment protects the U.S citizens against such actions. Key Words: NSA, Fourth, Amendment, warrant, PRISM, Edward, Snowden. The NSA collects millions of American phone, internet, and personal information. They do this by using a system call PRISM which allows them to collect this data through several different internet websites. However, many believe this is in complete violation of the Fourth Amendment which protects against unwarranted searches and seizures. The Fourth Amendment of the U.S. Constitution provides, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." The ultimate goal of this provision is to protect people’s...
Words: 2486 - Pages: 10
...there will be another threat against our Nation. Where is the balance between civil rights and national security? On October 26, 2001, President George W. Bush signed into law the Patriot Act with an overwhelming majority from Congress. The law was intended, in Bush’s words, to “enhance the penalties that will fall on terrorists or anyone who helps them.” ("George W. Bush Signs The Patriot Act", n.d. http://www.history.com/this-day-in-history/george-w-bush-signs-the-patriot-act). The bill broadly expanded law enforcements ability to investigate and perform surveillance and altered more than 15 different statues that had been in place since the early 1970’s. This law was enacted in great haste and does not provide a check and balances approach to safeguard the American citizens’ civil liberties. The Fourth Amendment of the Constitution protects the right of the people to be secure in their own persons, houses, papers, and effects against unreasonable search and seizure. This includes law enforcement...
Words: 1375 - Pages: 6
...FULL PAPER. AUTHOR’S NAME: NUPUR AGARWAL AFFILIATION: INSTITUTE OF LAW , NIRMA UNIVERSITY MAILING ADDRESS: 1 , RADHANPUR SOCIETY , BEHIND SWAMINARAYAN MANDIR , RAMBAUG , MANINAGAR , AHMEDABAD – 380008 PHONE NO: 09898839289 EMAIL-ID: nupuragarwal201995@yahoo.com CO-AUTHOR’S NAME: NUPUR JOSHI AFFILIATION: UNITED WORLD , SCHOOL OF LAW MAILING ADDRESS: 67, SWAGAT CITY , GANDHINAGAR – MEHSANA ROAD ADALAJ GANDHINAGAR PHONE NO: 9408968686 EMAIL-ID: nupurjoshi184@gmail.com TITLE OF THE PAPER: CYBER SPACE MASS SURVEILLANCE PROGRAMS,INFRINGEMENT OF PRIVACY OF INDIVIDUALS, BY STATE IN THE NAME OF NATIONAL SECURITY. ABSTRACT: In this present era of cyber revolution and globalization, citizens have turned into “Netizens”. The advancements in the field of technology is also accompanied with the development of various methods of surveillance and intervention by the State into individuals’ private information. Governments are keeping an eagle eye by monitoring individual's movements, businesses transactions and also the means of communication, which includes cyberspace. It is alleged that the United States of America’s National Security Agency runs a program known as PRISM, which enables the US government to gain access to e- mails , conversations, pictures, voice calls and even sign in details of people using websites and applications associated with 1|Page Facebook, Yahoo, Microsoft, to name a few. Failure of cyber law mechanisms and national authorities to advance legislation and...
Words: 6245 - Pages: 25
...valuable and classified NSA documents raise a number of ethical issues. Some people claim that Snowden did not do any wrong since he disclosed the wrong thing that was going on. However true that may be, this paper argues that there are better channels in which he could have used to let the cat out of the bag. Many are questioning if our government was betraying citizens because of the monitoring activity, and never revealing it. There was an absence present that lacked a legitimate procedure of informing citizens that they may be conducting unethical and unconstitutional activities. With the government’s activities set aside, the fact that he chose to reveal the classified information without following the right procedure will earn him the title of a whistleblower. A...
Words: 907 - Pages: 4
...What is the impact of Post 911 terrorist event and Iraq War on civil rights and Terrorism? III. Recent Trends in Americans Excepting New Security Measures as a Way of Life A. What is the impact of terrorism on American and global way of Life? B. What are the disadvantages and advantages of heightened Homeland Security Measures? C. What do people fear terrorist attacks or civil rights infringements the most? V. Conclusion THESIS STATEMENT This research paper will focus on the balancing of the relationship between American civil rights and America’s fight against terrorism. Terrorism has changed the way we use public transportation, travel in airports and train stations, eat in hotels and restaurants see movies, almost everything we do can be attacked by terrorist in America today. Terrorism by terrorist like Bin Laden and Al-Quada have influenced American government planning to develop a new agency called Homeland Security and the planning of foreign policy decisions for agencies like NSA (National Security Agency), CIA (Central Intelligence Agency), legislative, judicial, and other federal law enforcement agencies as part of the solution to explain protection policies and decisions that impact the civil rights of the public. The...
Words: 1269 - Pages: 6
...Introduction Ever since Civilization has become advanced enough to form war strategies, surveillance has played a part, whether it was for the war effort or for maintaining a vigilant eye on a nations people it has been constantly evolving with society through the advancements of different technologies that could be adapted for surveillance. I find this topic interesting as I believe it plays a major role on the progress of society. The area I find most interesting with regards to surveillance is the part it played through the years of 1950 – 1990 and how it has influenced the way surveillance is performed. The Stasi was a Russian secret police agency based in East Germany, the official name was the Ministry for State Security. The true...
Words: 1721 - Pages: 7
...Whistleblowing: Necessary Evil or Good Thing Maureen Haley University of North Carolina – Asheville April 16, 2014 This paper was prepared for Management 484-001, taught by Professor Donald D. Lisnerski Whistleblowing: Necessary Evil or Good Thing Is whistleblowing a necessary evil or good thing? Can whistleblowing be avoided? Can the whistleblower be protected? “A whistleblower is an employee who discovers corporate misconduct and chooses to bring it to the attention of others.”(Ghillyer, 2014) Whistleblowers can be viewed as providing a praiseworthy act or be severely labeled as informers who have breached the loyalty of their co-workers and company. Whistleblowing can be a service to the community and public. Whistleblowing can be ethical or unethical, and the whistleblower discovering corporate misconduct has the options to be an internal or an external whistleblower. Whistleblowing can save people’s lives. Dr. Jeffrey Wigand made the decision to go public with information that his employer Brown & Williamson (B&W) was manipulating the nicotine content, suppressed efforts to develop safer cigarettes, and lied about the addictive properties of nicotine. According to Sissela Bok, in the book Taking Sides: Clashing views in Business Ethics and Society, “not only is loyalty violated in whistleblowing, hierarchy as well is often opposed, since the whistleblower is not only a colleague but a subordinate. Though aware of the risks inherent in such disobedience...
Words: 3746 - Pages: 15
...Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing policies and procedures for private sectors. The executive branch of the government led by the Department of Homeland Security with close cooperation with other agencies including the National Institute of Standard and Technology (NIST) create mandatory policies and enforces their implementation by the private industry. This change was as a result of the September 11, attack...
Words: 1899 - Pages: 8
...STRAYER UNIVERSITY DR. MARK O AFOLABI RESEARCH PAPER WEEK 10 8/28/13 Explain computer ethics Computers are special technology and they raise some special ethical issues. In this essay I will discuss what makes computers different from other technology and how this difference makes a difference in ethical considerations. In particular, I want to characterize computer ethics and show why this emerging field is both intellectually interesting and enormously important. On my view, computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. I use the phrase "computer technology" because I take the subject matter of the field broadly to include computers and associated technology. For instance, I include concerns about software as well as hardware and concerns about networks connecting computers as well as computers themselves. A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used. Computers provide us with new capabilities and these in turn give us new choices for action. Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central task of computer ethics is to determine what we should do in such cases, i.e., to formulate policies to guide our actions. Of course, some ethical situations confront us as individuals and...
Words: 1695 - Pages: 7
...Intelligence Davis 3 Surveillance Court to authorize warrantless surveillance of Americans' international electronic communications. In this new act, the government can intercept Americans' international communications without a warrant as long as one party to the communication is "reasonably believed" to be outside the United States ("Chart: How 9/11 Changed the Law."). Later years brought the release of the Post 9/11 G.I. Bill, which gave educational funding to soldiers and the James Zadroga 9/11 Health and Compensation Act of 2010, which provided $4.2 billion for the health of those who worked at Ground Zero during and after the attacks ("9/11 to Now: Ways We Have Changed."). The USA Patriot Act of 2001, authorized the "sneak peak" searches. A sneak and peak search warrant allows the government to search your house and not have to tell you about it until months later. US Customs and Border Protection and Department of Homeland Security Policy changed from saying that a government official could read any paper work, documents, computer information, cell phone only if they see suspicion of them doing anything wrong. But now, the policy says that they are able to check it whenever they want even if they don't look suspicious of any wrongdoings ("Chart: How 9/11 Changed the Law."). Ever since 9/11 occurred, the intelligence state has increased. Meaning, we have more government intrusion in our lives post-911, from TSA airport checkpoints to NSA phone surveillance. Intelligence...
Words: 1216 - Pages: 5
...| TEMPEST Paper | | A brief look into the history and evolution of compromising emanations. | | Nicole King CIS 284s Winter 2013 | 2/1/2013 | | Introduction TEMPEST stands for “Telecommunications Electronics Material Protected From Spurious Emanating Transmissions”. It also is used to refer to security preventing any exploitation of vulnerabilities created by compromising emanations of electrical devices. Basically when electrical devices operate, they generate electromagnetic signals that can be intercepted and used to reconstruct sensitive information. “Listening” for these signals is known as “eavesdropping”. With the right equipment an eavesdropper can be hundreds of feet from the signal. This presents a real problem when a computer is processing classified information. The NSA (National Security Agency) has developed the TEMPEST standard which consists of several industry measurements to avoid such leakage. These computers have heavy metal cases, different power supplies and some additional modifications. History TEMPEST came about in 1918 by a man named Herbert Yardley. He and his Black Chamber staff were instructed by the U.S. Army to find ways to detect and exploit combat radio transmitters and telephones. Yardley determined that normal equipment was allowing secret information to be passed to the enemy via technical vulnerabilities. A program was then created to find ways to prevent the compromising emanations. Even though the initial...
Words: 1275 - Pages: 6
...in the United States of America is, “Are we being watched when we do this?”. Some would say yes, some would say no. It all depends on who you talk to. Government surveillance has been a well-known and widely used practice for a very long time, and most especially since the increase in global terrorist activities. This practice can be traced all the way back to 2001, starting with the government phone tapping citizens under court restrictions. Coming in the later years around 2009, cameras were being placed all around the country in order to keep an eye on the safety of and activities...
Words: 1982 - Pages: 8
...Are Facebook, Twitter, and Instagram worth it to get? | EN1420 Composition II | Are Facebook, Twitter, and Instagram worth it to get? Most people, seeing that millions actively use them, would say yes. I on the other hand, say no! I used to take part with each of these social media sites and as a user did not find them useful and actually found them to hinder my life. Many issues happen with work and home life; not to mention so many people are “addicted” and say too much or look at them way too often. Since the rise of social media sites in 2004 when Facebook went public to all, the American culture has become a very open, nosy, tell all population. Throughout my research I focused on the user perspectives and the negative sides of the sites; along with the Terms and conditions or behind the scenes aspects of the three sites. Focusing on just the user point of view at this point most people that use Facebook to begin with have features of their locations or tell the world of Facebook their day to day story including where they are going and what they are doing. This allows for people to stalk each other and know people’s daily routines giving the bad people of the world easy access to do what they would like. From personal experience Facebook can cause issues at work and within a household or relationship. You can send and receive messages and hide many wrong doings on Facebook. People can have secret relationships through Facebook with messaging or the IM feature...
Words: 2358 - Pages: 10