In September of 2001, the worst terrorist tragedy that has ever occurred on American soil, and quite possibly in the world, rocked the foundations of the United States of America. The unimpeded destruction of the twin towers of the World Trade Center led many to wonder how an event of such magnitude could not have been foreseen and prevented. Later, many sources led us to believe that it was not that the information was not there, but rather, it was the inability of intelligence communities and law enforcement agencies to communicate the data among themselves that resulted in the greatest security breach in American history. To combat this inability to coordinate use of data and information, the Defense Advanced Research Projects Agency (DARPA) developed a new brainchild, the Total Information Awareness (TIA) Program. The uniqueness of the TIA program is that it uses advanced computer data collection, sharing, and mining technologies to attempt to forewarn against terrorism by spotting patterns in people's behaviors and activities that resemble the actions of former terrorists. As one can imagine, there are numerous proponents and opponents for and against the TIA program. One of the main challengers of the program is the American Civil Liberties Union (ACLU) which has raised numerous issues regarding the effect the TIA program will have on our fundamental American right to privacy. The question that is raised is, can preemptive profiling systems provide additional levels of security to the public without jeopardizing personal privacy?
It is important first to understand exactly what DARPA's TIA Program is supposed to do and how it plans to perform these feats. First off, TIA is
[A]n experimental p...
... middle of paper ...
Brause, R. Langsdorf, T. Hepp, M. “Neural Data Mining for Credit Card Fraud Detection” Frankfurt, Germany. J.W. Goethe-University. 1998
Aftergood, Steven and Pike, John “Financial Crimes Enforcement Network OPS.” Washington DC. 1998. http://www.fas.org/irp/agency/ustreas/fincen/ops.html
Katayama, Fred “Hacker hits up to 8M credit cards.” CNN. 2003. http://money.cnn.com/2003/02/18/technology/creditcards/index.html
Simons, Barbara and Spafford, Eugene. Letter to Senate Committee on Armed Services. Washington DC. 2003 http://www.acm.org/usacm/Letters/tia_final.html
ACLU. “Q&A on the Pentagon's ‘Total Information Awareness’ Program”. Washington DC. 2003 http://www.aclu.org/Privacy/Privacylist.cfm?c=130
John Bartlett (1820–1905). Familiar Quotations, 10th ed. 1919. http://www.bartleby.com/100/245.html
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Protecting privacy is considered an essential human right, crucial and important to the protection of liberty. Although privacy is such a massive part of our lives, today’s technology is threatening the safety and privacy of many people (Rotenberg). Cell phones, social media, government, and other forms of technology threaten the lives of many both in their personal life and their life in the workplace (Lazar). We must start to consider ways to help protect privacy more efficiently to protect the lives of people all across the globe.... [tags: Facebook, Privacy, Twitter, Internet]
1407 words (4 pages)
- In an effort to develop a viable privacy culture within the organization, the first step to achieve the enhancement of a culture of privacy protection within the department would be to develop a code of conduct. Based on the reality that such a code, usually referred to as a code of ethics is seen to be the basis of any ethics program it would only be prudent to institute the development of the same as a starting point. Such a code of conduct should be developed in such a manner as to be able to address previous unethical conducts within the department as well as project into the future so as to prevent future acts that would be unethical.... [tags: Organizational Issues]
880 words (2.5 pages)
- It’s not uncommon for a journalist to be a witness or document matters they may be subject to legal scrutiny. In these cases, law enforcement will sometimes approach the journalist after a story has been published to probe about information gathered but not published while researching the story. There’s be an ongoing debate about a journalists right to protect their sources and carefully sought out research and the powers of law enforcement to seize that information in order to conduct criminal proceedings.... [tags: Supreme Court of the United States]
1107 words (3.2 pages)
- The protection of consumer privacy in e-business The digital era arrives. Blue Book information editorial board and Social Science Literature Publishing House (2010) pointed out that “China's e-commerce transaction volume reached 3.85 trillion yuan in 2009”. Utilisation of e-business services was also high amongst Hong Kong people. About 98.3% of all persons had used e-business services such as Octopus Card and Automatic Teller Machine (Census and Statistics Department, 2009). One of the pitfalls for the development of e-business, however, is the concerns on consumer privacy.... [tags: Consumer Privacy, Data, Solutions]
1281 words (3.7 pages)
- The government has passed some laws which are intended to protect children on the internet. The Children’s Online Privacy Protection Act (COPPA) and Children’s Internet Protection Act (CIPA) are to give protection for children who are accessing the internet. There are requirements and protective information for both COPPA and CIPA. Both acts are similar and different in ways to protect children but needed to be done with two acts. There are challenging elements with the COPPA and CIPA to implement in order to be compliant with the acts.... [tags: CIPA, government, websites]
1336 words (3.8 pages)
- CONTENTS PAGE EXECUTIVE SUMMARY iv CHAPTER 1 - INTRODUCTION 1 Background 1 Statement of Purpose 1 Scope 2 Limitations 2 Methods of Research 2 CHAPTER 2 - FINDINGS 3…………………………………………………………3 Current Regulations 3 Current Expectations from customers 6 Reason Additional Regulations should be added 8 Future Potential 9 CHAPTER 3 - CONCLUSIONS AND RECOMMENDATIONS 11 Conclusions 11 Recommendations 12 WORKS CITED 13 EXECUTIVE SUMMARY This report will describe the history of government regulations and FTC.... [tags: Data Privacy]
2928 words (8.4 pages)
1907 words (5.4 pages)
- As a private citizen, my privacy is very important, especially when in this new digital age; governmental agencies will use that information against you if they have a probable cause to. However, we are protected under the First and Fourth amendment, which gives us rights to speech, to drink or smoke in our homes without governmental intrusion. But when those rights are violated, we have the options to dispute those actions and if not satisfied with the results we can take it to the courts. But in order to do this we must limit what we say or do, in order to prevent these agencies from trying to impinge on our rights of liberty.... [tags: social media, constitutional rights]
906 words (2.6 pages)
- “HeLa cells were one of the most important things that happened to medicine in the last hundred years.” This quote portrays the overall importance of HeLa cells to the science community, and reveals just how significant the exploitation of Henrietta was. Henrietta Lacks was a middle-aged, African American woman who developed cervical cancer like many others in the 1950’s. However, cell samples were taken from here without consent, and these cells were unlike any cell ever seen before. Tragically, Henrietta died shortly after and her family knew nothing of these cells that were found to be “immortal,” until one day, when their lives would never be the same.... [tags: Henrietta Lacks, HeLa, Rebecca Skloot]
1615 words (4.6 pages)
- Protection vs. Privacy In September of 2001, the worst terrorist tragedy that has ever occurred on American soil, and quite possibly in the world, rocked the foundations of the United States of America. The unimpeded destruction of the twin towers of the World Trade Center led many to wonder how an event of such magnitude could not have been foreseen and prevented. Later, many sources led us to believe that it was not that the information was not there, but rather, it was the inability of intelligence communities and law enforcement agencies to communicate the data among themselves that resulted in the greatest security breach in American history.... [tags: Technology TIA Essays]
5442 words (15.5 pages)