Site Loader
Rock Street, San Francisco

Technology Or Privacy? Essay, Research Paper

George Orwell said it best in his fresh 1984 ; Big Brother Is Watching you. He

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

wrote these words in 1949. Who would hold thought that 50 old ages from so it is

going world alternatively of fiction? It now seems as if engineering makes the planet

revolve. I will discourse certain facets of the issue over privateness rights in concurrence with

engineering. In this paper I will turn out that the authorities, concerns, and persons

hold entree to about anyone s information. I will besides turn out that this will neither stop,

nor decelerate down. I will besides offer theories about authorities cover-ups.

Anything you store on your computing machine can be used against you. ( Wang, p.69 ) The

authorities has entree to every spot of information you put on a signifier. Anything from

medical records to recognition studies. Even your most sensitive information is available to the

authorities. Virtually every major alteration in life is recorded someplace in a authorities

files. Shortly after you are born, a birth certification is issued. When you obtain a driver & # 8217 ; s

licence, acquire married, purchase a house, or register a case, these events are recorded in

public paperss easy available to you and to others. ( Privacy Rights Clearinghouse,

hypertext transfer protocol: //www.privacyrights.org/FS/fs11-pub.htm ) Businesss besides have entree to sensitive

information such as recognition studies and recognition card Numberss. In fact, anyone with a

justifiable concern demand for it has entree to it. Spamming is besides a loss of privateness.

Spamming is debris mail on your computing machine. Often its advertizements for money devising

strategies, concern chances, or even erotica. Some people sell e-mail references

to concerns to do money. Besides, when you put your e-mail reference on signifiers, you run

the hazard of it being sold to concerns for the intent of spamming. The cost of spamming

is low, hence, even if one per centum of the people spammed really read and make what the

Spam asks them to make, it will cover the minimum costs of spamming. Telemarketers besides

interfere with peoples privateness. Technology such as national phone figure databases and

automated dialing machines allow telemarketers to make about anyone with a phone line.

With the right tools, any ordinary individual can derive entree to your personal information.

Computer hacking is one manner ; computing machine viruses known as Dardans can give let

sensitive information to be revealed to a funny hacker. ( Wang, 301 ) I was the victim of

a Trojan this past summer. The individual who put the Trojan on my computing machine had entree to

everything on my difficult thrust including my watchwords. These are non easy detected unless

you are careful and cognize what to look for. One might believe that they have complete

privateness, but small do they cognize a individual two blocks off or two hundred 1000s stat mis

off could hold entree to their information. Interactions between people that are

mediated by engineering are prone to both witting and accidental invasions on

privateness ( Bellotti, 66 )

Technology is turning at an incredible rate. Within a period of about 15

old ages, the Internet has gone from a medium used purely by universities, scientists, and the

military to a planetary medium used for everything from instruction to amusement by a

bulk of the US population. Harmonizing to research by MIT, the size of the Internet

tripled from 1993 to 1996. ( Internet Growth & # 8211 ; Summary,

hypertext transfer protocol: //www.mit.edu/people/mkgray/net/internet-growth-summary.html ) By the twelvemonth 2000,

it is projected that about half of the population of the universe that speaks English will hold

Internet entree. ( Global Internet Statistics, hypertext transfer protocol: //www.euromktg.com/globstats/ ) Will

this turning of all time halt? I can t foretell the hereafter, but I would be willing to wager that it

won t. It is now common wisdom that the power, capacity and velocity of information

engineering is speed uping quickly. The extent of privateness invasion & # 8211 ; or surely the

possible to occupy privateness & # 8211 ; increases correspondingly. ( Privacy International,

hypertext transfer protocol: //www.privacyinternational.org/survey/Overview.html # Heading2 ) The Internet is

accessible to anybody. Therefore, the people who use it are ac

cessible to anybody.

It is my steadfast belief, that the authorities has more engineering than we could of all time

dream of that we do non cognize approximately. The Manhattan undertaking, a good known illustration, in

the 1940 s gave the United States the ability to destruct the universe. This top secret undertaking

created atomic arms. Civilians and most military forces had no thought this was even

traveling on. This was developed to stop World War II, little did they know that this

engineering could destruct the universe. The Central Intelligence Agency s chief map is

espionage. The authorities grants them the right to descry on other states, so what is

halting them from descrying on us? Nothing. Law enforcement has the ability to track

people with cellular telephones. ( EPIC, hypertext transfer protocol: //www.epic.org/privacy/ # hot ) Here is

another thing to believe approximately: As reported in Wired News, Image Data & # 8212 ; a company

apparently seeking to supply a new method of halting recognition card and look into fraud & # 8212 ; has

been constructing a database of cross-referenced exposure and purchase histories.

Documents obtained by EPIC through Freedom of Information Act requests show the function

of the Secret Service in directing and funding Image Data & # 8217 ; s pilot plans. In its undertaking

of set uping an unprecedented national individuality database, Image Data purchases driver & # 8217 ; s

licence exposures without the permission or cognition of citizens. ( EPIC,

hypertext transfer protocol: //www.epic.org/privacy/ # hot ) The following clip you pick up your telephone, how can

you be certain that person from the authorities ( who s wage you help pay to protect you )

is non listening in on your conversation? Harmonizing to the Electronic Privacy Information

Center ( EPIC ) , the petition for federal and province wiretaps and bugs increased 12 % . ( EPIC,

hypertext transfer protocol: //www.epic.org/privacy/wiretap/ ) Should the authorities be trusted? Would you

believe me if I told you that the authorities bribed phone companies to do wiretapping

and teasing easy? Its true. Epic studies: On the last dark of the 1994 session,

Congress enacted the Communications Assistance for Law Enforcement Act ( CALEA ) ,

sometimes called the & # 8220 ; Digital Telephony & # 8221 ; measure. CALEA requires telephone houses to do it

easy to intercept the state & # 8217 ; s communicating system. The measure faced strong resistance from

industry and civil autonomies organisations, but was adopted in the shutting hours of Congress

after the authorities offered to pay telephone companies $ 500,000,000 to do the

proposed alterations. EPIC opposed transition of the measure and believes that the authorities has

failed to warrant the $ 500,000,000 appropriation required. ( EPIC,

hypertext transfer protocol: //www.epic.org/privacy/wiretap/ ) If it makes it easier for jurisprudence enforcement to tap,

doesn T that make it easier for funny civilians to tap? I believe that the authorities

should be utilizing their power to protect our privateness alternatively of infringing it.

All in all, I believe our privateness is in hazard. The authorities is the accelerator for

engineering increasing. Equally long as it is turning the greater loss of privateness we have. Its

inevitable, this tendency of engineering forces privacy out the window. People merely like us

within the authorities are leting this to go on ; this is what scares me. I began this

essay with a quotation mark that has turned out to be true, and I will stop with one that I hope

doesn t come true. It seems as if we are good on the route to it going true. It s in

your nature to destruct yourselves & # 8211 ; The Terminator ( talking about world )

Mentions:

Agre, P. ; Belloti, V. ; et Al. ( 1997 ) . Technology and Privacy: The New Landscape.

Cambridge, Mass: The MIT Press

Wang, W. ( 1998 ) Steal This Computer Book San Francisco: No Starch Press

Privacy Rights Clearinghouse,

hypertext transfer protocol: //www.privacyrights.org/FS/fs11-pub.htm

Internet Growth & # 8211 ; Summary,

hypertext transfer protocol: //www.mit.edu/people/mkgray/net/internet-growth-summary.html

Global Internet Statistics,

hypertext transfer protocol: //www.euromktg.com/globstats/

Privacy International,

hypertext transfer protocol: //www.privacyinternational.org/survey/Overview.html # Heading2

Electronic Privacy Information Center,

hypertext transfer protocol: //www.epic.org/privacy/ # hot

hypertext transfer protocol: //www.epic.org/privacy/wiretap/

Post Author: admin

x

Hi!
I'm Gloria!

Would you like to get a custom essay? How about receiving a customized one?

Check it out