Protection vs. Privacy

5442 Words22 Pages
Protection vs. Privacy

In September of 2001, the worst terrorist tragedy that has ever occurred on American soil, and quite possibly in the world, rocked the foundations of the United States of America. The unimpeded destruction of the twin towers of the World Trade Center led many to wonder how an event of such magnitude could not have been foreseen and prevented. Later, many sources led us to believe that it was not that the information was not there, but rather, it was the inability of intelligence communities and law enforcement agencies to communicate the data among themselves that resulted in the greatest security breach in American history. To combat this inability to coordinate use of data and information, the Defense Advanced Research Projects Agency (DARPA) developed a new brainchild, the Total Information Awareness (TIA) Program. The uniqueness of the TIA program is that it uses advanced computer data collection, sharing, and mining technologies to attempt to forewarn against terrorism by spotting patterns in people's behaviors and activities that resemble the actions of former terrorists. As one can imagine, there are numerous proponents and opponents for and against the TIA program. One of the main challengers of the program is the American Civil Liberties Union (ACLU) which has raised numerous issues regarding the effect the TIA program will have on our fundamental American right to privacy. The question that is raised is, can preemptive profiling systems provide additional levels of security to the public without jeopardizing personal privacy?

It is important first to understand exactly what DARPA's TIA Program is supposed to do and how it plans to perform these feats. First off, TIA is

[A]n experimental p...

... middle of paper ...

...2. http://www.fas.org/irp/agency/dod/poindexter.html

Brause, R. Langsdorf, T. Hepp, M. “Neural Data Mining for Credit Card Fraud Detection” Frankfurt, Germany. J.W. Goethe-University. 1998

Aftergood, Steven and Pike, John “Financial Crimes Enforcement Network OPS.” Washington DC. 1998. http://www.fas.org/irp/agency/ustreas/fincen/ops.html

Katayama, Fred “Hacker hits up to 8M credit cards.” CNN. 2003. http://money.cnn.com/2003/02/18/technology/creditcards/index.html

Simons, Barbara and Spafford, Eugene. Letter to Senate Committee on Armed Services. Washington DC. 2003 http://www.acm.org/usacm/Letters/tia_final.html

ACLU. “Q&A on the Pentagon's ‘Total Information Awareness’ Program”. Washington DC. 2003 http://www.aclu.org/Privacy/Privacylist.cfm?c=130

John Bartlett (1820–1905). Familiar Quotations, 10th ed. 1919. http://www.bartleby.com/100/245.html

More about Protection vs. Privacy

Open Document