preview

National Security vs. the Right to Privacy

analytical Essay
1764 words
1764 words
bookmark

Abstract: Electronic mail is quickly becoming the most prevalent method of communication in the world. However, e-mail systems in corporate, institutional, and commercial environments are all potential targets of monitoring, surveillance and ultimately, censorship. Electronic mail is a phenomenon that has begun to pervade all aspects of our lives today. We use e-mail in our personal lives, at our schools, at our jobs, and everywhere in between. However, very few of us consider the fact that even though our e-mail is composed by the sender, and is intended to be read only by the recipient, it actually passes through many hands in between. Transmitted e-mail will often travel through up to 5 or 6 different servers on its way from sender to recipient. Along the way, it can be read, changed, and even destroyed by any party with the means and the inclination to do so. The decision to monitor e-mail is left to the organization that provides the e-mail service to users. These organizations can range from educational institutions and private corporations, to governments and non-profit organizations. Each of these different types of organizations has a different agenda and goals, not only in general, but also for their members-and more specifically, for their members' e-mail. While educational institutions can provide e-mail facilities to their constituents for the purposes of convenience, employers almost always maintain e-mail facilities for the sole purpose of improving the on-the-job productivity of their employees. Richard Epstein's The Case of the Killer Robot, provides an ideal demonstration of the benefits of e-mail monitoring. "Silicon Techronics Employee Admits Faking Software Tests" (... ... middle of paper ... .... Ethics and computing: living responsibly in a computerized world. IEEE. 2001. Cripps, Wayne. Dartmouth College, Department of Computer Sciences. Personal Communication, January 24th, 2001. Epstein, Richard. The case of the killer robot: stories about the professional, ethical and societal dimensions of computing. John Wiley and Sons. 1996. Federal Bureau of Investigation. "Congressional Statement -2000." http://www.fbi.gov/pressrm/congress/congress00/kerr090600.htm. Higgins, Kevan. Cleary, Gottlieb, Steen and Hamilton. Personal Communication, January 23rd, 2001. Matthews, James. Dartmouth College, Department of Computing Services. Personal Communication, January 23rd, February 7th, 2001. User Communications. Dartmouth College, Department of Computing Services. "Computer and Network Policy." BlitzMail Bulletin. Wed, 15 Nov 2000 13:36:45.

In this essay, the author

  • Argues that the 4th amendment of the u.s. constitution maintains that citizens shall never be subject to illegal searches or seizures, but the supreme court has not conclusively ruled whether or not the surveillance of e-mail constitutes illegal search.
  • Explains that carnivore has only been used in investigations about 25 times since its inception in 1998. the f.b.i. works with internet service providers when deploying electronic surveillance.
  • Explains that a service provider's decision about whether or not to monitor e-mail is far less clear-cut than the federal courts.
  • Explains that private corporations monitor the e-mail of their employees to protect them from inappropriate traffic, including lewd and vulgar content.
  • Explains epstein, richard, the case of the killer robot: stories about the professional, ethical and societal dimensions of computing.
  • Analyzes how e-mail systems in corporate, institutional, and commercial environments are all potential targets of monitoring, surveillance and ultimately, censorship.
  • Explains that while ubs warburg's e-mail monitoring practices appear to be practically motivated, other employers have ethical reasons for monitoring their employees' email.
  • Cites matthews, james, dartmouth college, department of computing services. computer and network policy.
Get Access