Professional Documents
Culture Documents
CST 373 Post 911 Privacypaper
CST 373 Post 911 Privacypaper
element (or liberty), or to treat these concepts as if they were synonymous with privacy, further
extending the reverence for privacy (Etzioni, 1999). Where others is used to represent people,
corporations, and governing bodies that may infringe upon the privacy of any given person.
Intrusions can manifest in a number forms, where an entity gathers information on an individual
without their consent, hinders their right to act, speak, or think. This information includes an
individuals actions, thoughts, beliefs, and even their possessions. An individual retains the right
to nullify their privacy by sharing this information (or information of possession) with other
parties. To further expand upon the concept of privacy, we can consider privacy as a state in
which a person is free from observation, or from being disturbed by others. The previously noted
observations can be considered an intrusion as defined earlier in this paper. The concept of
intrusion, based on our understanding of privacy, can be seen as an unwarranted accessing of
someones information, sharing said information, or infringing upon their beliefs.
Legislation following 2001 has further defined this concept of intrusion, by redefining the
boundaries of ones personal privacy. The terrorist attacks that took place on September 11th,
2001 forever changed the way the United States interacts with its inhabitants. The word
privacy is one that is greatly associated with the attacks, where the American publics
definition of privacy was redefined via the USA PATRIOT Act (Uniting and Strengthening
America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of
2001). Standing for the people, Congress, in 2001, was attempting to reach a consensus on
protecting Americas electronic privacy from the government. Once the attack happened on the
Pentagon and the World Trade Centers on September 11th, Congress decided the government
had the right to form the Patriot Act, which allows the government to place anyone under
surveillance to prevent another devastatingly tragic terrorist attack. Now the government believes
innocent Americans are suspects, monitoring everything from email conversations to bank
statements and credit card reports (Surveillance Under the Patriot Act). The Patriot Act was
passed at time when the citizens of the US were outraged, grieving, demanding for some action
be taken, and seeking answers. Congress presented to the American people, the Patriot Act,
promising that this would be everything the people were looking for. The act was passed just
forty-five days after the attacks that took place on September 11th. The actions taken in this
instance, the bill being passed, has reformed the way we live and how we perceive privacy in the
United States.
light he shed on how it was being used. In 2013, he was successful in exposing just how far the
government was taking their domestic surveillance under the umbrella use of the Patriot Act.
This surveillance included everything from collecting internet metadata to the correspondence of
foreign officials. Because of this, Twenty-five percent of Americans say they have changed the
way they use technology at least somewhat after the Snowden revelations. (Ali & Abdullah,
2016).
In the book Click: What Millions of People Do Online and Why it Matters, by Bill
Tancer, he explains the internet is not as private anyone thinks, even the Government. Bill
Tancer is a General Manager at Hitwise, which is a competitive intelligence company. Tancer
has been interviewed by the New York Times, USA Today, Business Week, Forbes Online, and
CNN Money about his astounding results he made public. To start the book, he quoted the
governments claim that 99% of the porn on the internet was no longer found anywhere on the
internet. After examining the study, Tancer found 40% of users who are on the internet are
visiting porn sites, which is contradicting what the government had claimed. Before the social
media boom, people kept to themselves, talking to people they knew about their personal
matters. Today, on any social media site, there are personal posts and information people share
with everyone who is connected. These personal posts include where they are from, what year
they were born, what they are up to, and much more. What is popular among our generation is
keeping up with celebrities posts about their personal life. This is an issue because this redefines
our interpretation of privacy, especially to younger generations and thus creating Celebrity
Worship Syndrome. Celebrity Worship Syndrome happens to a person when they become
obsessed over what a certain celebrity is doing (Tancer, B.). Younger generations will see what
these Celebrities are doing and react as if it is OK or normal to post and say personal things
about themselves because their role models did it.
Court ("FISC") for an order to seize business records of hotels, motels, car and truck rental
agencies, and storage rental facilities. Section 215 broadens that authority by eliminating any
limitation on the types of businesses or entities whose records may be seized. In addition, the
section expands the scope of the items that the FBI may obtain using this authority from
"records" to "any tangible things (including books, records, papers, documents, and other
items)." The recipient of the order may not disclose the fact that the FBI has sought or obtained
records." (DeRosa, M., 2016). To put into perspective how this was used, FISA only issued 51
orders between the years of 2007 and 2009, Snowdens revelations about the Patriot Act steered
the FBI away from using section 215 as a means to obtaining the metadata of US citizens. The
FISA court issued almost 600 orders for internet meta-data use between 2012 and 2014, this
significant increase was unprecedented and directly related to the Patriot Act.
nullify their individual privacy when they believe that their safety or security is at stake, this is
what Capurro refers when stating that the idea of transparency is overtaking the idea of privacy.
Transparency in relation to personal information is a concept that is becoming more
prevalent within modern society. The idea of privacy has begun to take on a new form, where an
individual and their sense of anonymity is being overshadowed by the community as a whole.
The problem with this line of thought is that society may not know the best course of action for
all its members. This idea is one that is shared by Sue Conger et al. in their paper entitled
Personal information privacy and emerging technologies. Conger et al. resonate the idea
stating that individuals are obligated to relinquish personal data for their own security as well as
for the collective good, (Conger, S., Pratt, J., & Loch, K,, 2013). This utilitarian train of
thought is leading to a society where anonymity is considered a form of guilt, where if an
individual has information worth keeping hidden they are considered abnormal and in some
instances dangerous. In actuality anonymity is needed to protect individuals from feeling any
form of guilt, embarrassment, or other ill-mannered feelings as a result of their actions, likes, or
dislikes. Hashemi represents this notion best by taking from the Globes Ivor Tossells writing,
summarizing that the truly private aspects of online life are the things we do out in the open, on
public websites, under the pretense of anonymity. While our Facebook pages sit there and look
pretty on our behalf, our real selves sneak off and start asking Google about the medical
conditions were convinced weve just acquired (Hashemi, Y., 2009). This statement can be
summarized as meaning that an individuals privacy is not defined by the information that is
shared willingly online via networks, but instead by the online actions taken by said individual.
If we take this statement as the truth it highly advocates the need for online anonymity.
introduced new features involving third party partners. One feature in particular, named Social
Ads introduced the concept of ad-profiling, where Facebook used information to make
advertising within their service more meaningful to users. The service would also allow users to
share activities taken on third party websites with their friends. A second feature implemented in
2007 was Beacon, where Beacon was a service that allowed Facebook to track its users
activities on third-party websites. Users were not explicitly aware of the changes because
Facebook does not notify users about changes or additions to its service via email, Facebook
instead publishes these changes to their feature blog. One could argue that this practice misleads
users as to what Facebook is changing about the service.
Other companies (such as Google) use similar tactics where they incorporate online
tracking to increase the relevancy of its ads, however, these companies do not use user
identities information to endorse the ads, nor do they advertise their users activities in any way
(Hashemi, Y., 2009). Other companies also engage in online tracking, however do not track
users beyond their domain (meaning that they do not track users on third-party websites). These
activities and type of advertisement curation allows users to maintain their anonymity, thus
ensuring that their personal information is protected via the veil of such anonymity. The fact that
users are not directly tied to these curated advertisements and their tracked information is not
directly tied to any personal information guarantee that the users privacy is not breached.
personal space. Leila Fadel, one of NPRs (National Public Radio) reporters, stayed in Egypt and
experienced how crowded the city was. Fadel traveled around Cairo, Egypt on a microbus, which
was the size of a minivan, squashed in tight with 12 other people (Fadel, L. & Garcia-Navarro,
L.). Being no personal space, there also is not any room for freedom of speech. Since 2010, it has
been recommended to the Egyptian government to give journalist freedom of press without being
imprisoned and giving people the right to participate in political and public life. The Constitution
of Egypt, however, grants privacy of communication to their citizens. Any documentation or
electronic correspondence is considered private unless temporarily confiscated by a judicial
order. It also, grants citizens the right of privacy in their own home, which means, no one is
allowed to search and enter their home without a warrant (The Right to Privacy in Egypt).
Another culture that sees privacy differently than American culture is Brazil. According
to Lourdes Garcia-Navarro, a journalist from NPR, stayed in Sao Paulo, Brazil, a city populated
by 20 million people, experienced this so called touchy-feely culture. The citizens in Brazil are
more open and comfortable being close to each other. As most Americans will stare at their feet
or listen to music, most Brazilians will converse with one another, even though they are not
acquainted (Fadel, L. & Garcia-Navarro, L., 2013). Personal data for Brazilians, such as personal
records, are considered private, but when talking about electronic communications, the Brazilian
law has a timid approach on protecting electronic privacy rights. This is known as the
wiretapping law, which allows the Brazilian government to go through banking information,
deposits, payments, investments, currency transactions, and credit card usage. Due to the law, the
government, businesses, and other individuals can register and process data in an unlawful
manner even if the Brazilian Civil Code (BBC) give citizens personal rights (Fortes, V., 2013).
A third culture whose definition of privacy differs from the United States is Japan. Japan
is a country rooted in ritual. According to Capurro, the Japanese lifestyle has led to to a concept
we can refer to as denial of self, where the Japanese seek the approval of the group
(community) as a whole instead of seeking self satisfaction (Capurro, R., 2005). This line of
thought arises do to the interconnectedness of each member of the population. Japan had a
population of 127.3 million people in 2013, where a staggering 13 million lived in Tokyo alone
(Tokyo Population 2013, 2014). The immense size of the countrys population leaves little room
for personal privacy. Capurro's argues that this concept is mirrored in other aspects of Japanese
culture, namely privacy within the online community. The Japanese see the cyberspace as an
enlargement of the space between us, where the space is considered to be private but in a
collective, non-individualistic way (Capurro, R., 2005). His argument is that the Japanese see
the cyberspace as an extension of their society, where the space between people is defined as
both private and public. He continues by acknowledging that the Japanese create a sense of
online privacy in the form of useage, where the user of the Japanese cyberspace is an individual
within the collective or culture because the japanese cyberspace is not accessible to strangers
(Capurro, R., 2005).
thirties. Someone from the Millennial generation may have a completely different outlook on
privacy than the frame of reference that someone from Generation X or from the Baby Boomer
generation might have. Even if there are shared characteristics between the generations on their
respective ideas of privacy they will almost always be different in some way. According to the
Pew Research Center, ...while only 7% of all adults in the U.S. were SNS users a decade ago,
in 2015 this number increased to 65%. Ninety percent of young adults are currently SNS users
and usage among those who are 65 years old or older has tripled since 2010, reaching to 35%
(Perrin, 2015). (Lukas, J., 2016). What we can learn from this, is that sharing information with
others has become more commonplace, as well as a more acceptable thing as time has passed.
Especially so with the younger generations, that have grown up immersed in the technology as it
developed and progressed making the use of it as opposed to older generations being entered into
it, and having to learn about it.
Is anonymity acceptable?
Anonymity and the use of it, in essence is not inherently malicious. In the past some
authors would remain anonymous by writing under a pseudonym, people write in to advice
columns, call in tips to the police, and can do all of it anonymously. All of this is done for the
sake of maintaining the persons privacy. People want the ability to remain anonymous and not
be watched by agencies like the NSA, that gather your data and store it in massive servers for it
to be accessible by several other agencies(the Federal Bureau of Investigation, Homeland
Security, the Department of Justice). That does not however shield it from being used for wrong
either. With the advent of the internet and the ability to be anonymous online, people can say and
do a multitude of malicious things without fear of consequence because they are hidden.
Whether the use of anonymity is acceptable or not is dependent on the intent of its use. When it
is used with the intent of causing damage, of being used as a weapon such as, cyberbullying,
identity theft, fraud, anything that would cause harm, it is not acceptable. If it is used in the
aspect of keeping your information safe, against those that would do you harm, that would be
acceptable. One step that can be taken toward this goal of safeguarding your personal
information is encryption.
When one thinks of anonymity, the word encryption is surely close to follow, whether it
is being used to hide who you are, or what you are doing. Encryption is the act of encoding
information in a way that only those with the proper method of accessing it can do so, this can be
used to protect identities, personal information, communications and more. In 1997 Dorothy
Denning and William Baugh Jr. said, "At 128 bits, finding an encryption key by exhaustively
checking all possibilities is not even feasible in a lifetime using all the computers in the world."
(Etzioni, 1999). At the time this may have been the case, however we now have encryption keys
that are 256 bit and some that can go higher (RSA is capable of 512 bit but uses a less secure
algorithm, and as such is used less often), and 128 bit encryption has been broken. Encryption is
still the most secure way of protecting your information and keeping it safe, however its use can
also keep the agencies that are in place to help protect us, from being able to uncover information
that may help them stop something from happening. The argument then becomes one of not
whether anonymity is acceptable but whether a person's right to privacy outweighs the use of
anonymity for. With the number of ways information can be mistreated and mishandled across
the internet and by corporations, when done responsibly the use of anonymity is acceptable.
Conclusion
The conception expressed in the Fourth Amendment provides a solid foundation for
communitarian public philosophy of privacy, one that has significant implications for our social
mores, public policy, and jurisprudence as we struggle to adapt our institutions into the
cyber-age.(Etzioni, 1999). We are now living in that cyber-age that Etzioni mentions in his own
conclusion from "The Limits of Privacy". Through the research conducted to write this paper it is
evident that privacy is a fickle matter and is a value that will be changing as the laws and bills
that help define it are struck down, created a new, or amended. We live in an age where
everything is at the tip of your fingers thanks to smart phones, the internet, vine, youtube,
facebook, places where your privacy may be infringed upon, yet we freely access these sites
nullifying our right to privacy as we post videos, pictures, and statuses telling the world what is
going on in our daily lives. Companies buy and sell the metadata of its users, to others and use it
for their own gain. Ambiguity arises in the form of third parties where users inadvertently release
more personal information than aware, via the initialization with second parties through
transactions for goods or services. As the world becomes more interconnected through
technology, full transparency will become the social norm, and the idea of privacy will slowly
fall away to only the most personal of information, eventually redefining what privacy is.
References:
Ali, S. & Abdullah, H. (2016). Did the Patriot Act change U.S. attitudes on
surveillance?. NBC News. Retrieved 16 October 2016, from
http://www.nbcnews.com/storyline/9-11-anniversary/did-patriot-act-change-us-attitudes-s
urveillance-n641586
Capurro, R. (2005). Privacy. An Intercultural Perspective. Ethics and Information Technology,
7(1), 37-47. doi:10.1007/s10676-005-4407-4
Conger, S. , Pratt, J. , & Loch, K. (2013). Personal information privacy and emerging
technologies. Information Systems Journal, 23(5), 401-417.
DeRosa, M. (2016). - Sections 214 and 215. Apps.americanbar.org. Retrieved 16 October 2016,
from https://apps.americanbar.org/natsecurity/patriotdebates/sections-214-and-215
Etzioni, A. (1999). The limits of privacy. New York: Basic Books.
Fadel, L. & Garcia-Navarro, L. (2013). How Different Cultures Handle Personal Space.
NPR.org. Retrieved 16 October 2016, from
http://www.npr.org/sections/codeswitch/2013/05/05/181126380/how-different-cultures-h
andle-personal-space
Fortes, V. (2016). THE RIGHT TO PRIVACY AND PERSONAL DATA PROTECTION IN
BRAZIL: TIME FOR INTERNET PRIVACY RIGHTS?. BRUSSELS PRIVACY HUB.
Retrieved 16 October 2016, from
https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/files/BPH-Working-Paper-VOL
2-N5.pdf
Hashemi, Y. (2009). Facebook's privacy policy and its third-party partnerships: Lucrativity and
liability. Boston University Journal of Science & Technology Law, 15(1), 140-161.
Lukas, J. (2016). Age differences in privacy attitudes, literacy and privacy management on
Facebook. Cyberpsychology.eu. Retrieved 16 October 2016, from
http://www.cyberpsychology.eu/view.php?cisloclanku=2016052301
Moore, A. (2008). Defining privacy. Journal of Social Philosophy, 39(3), 411.
Surveillance Under the Patriot Act. (2016). American Civil Liberties Union. Retrieved 16
October 2016, from https://www.aclu.org/infographic/surveillance-under-patriot-act
The Right to Privacy in Egypt. (2016). privacyinternational.org. Retrieved 16 October 2016,
from https://www.privacyinternational.org/sites/default/files/UPR_Egypt.pdf
Timm, T. (2014). Four ways Edward Snowden changed the world and why the fight's not over
Trevor Timm. the Guardian. Retrieved 16 October 2016, from
https://www.theguardian.com/commentisfree/2014/jun/05/what-snowden-revealed-chang
ed-nsa-reform
Tancer, B. (2008). Click. New York: Hyperion.
The USA Patriot Act | Department of Government and Justice Studies | Appalachian State
University. (2016). Gjs.appstate.edu. Retrieved 16 October 2016, from
http://gjs.appstate.edu/media-coverage-crime-and-criminal-justice/usa-patriot-act
Tokyo Population 2013. (2014). Retrieved October 14, 2016, from
http://www.worldpopulationstatistics.com/tokyo-population-2013/