Professional Documents
Culture Documents
donna Bair-Mundy
Intercepting topics
Security
Libraries
Privacy Surveillance
Topics
What is privacy? Why do we need it?
Privacy in Libraries
Discussion questions:
What is privacy?
Why do we need it?
Informational privacy - Westin's
definition - part 1
Ongoing dialectic
Informational privacy - Westin's
definition - part 4
Thus each individual is continually
engaged in a personal adjustment
process in which he balances
the desire for privacy with the desire
for disclosure and communication
of himself to others, in light of
the environmental conditions and
social norms set by the society
in which he lives.
Social norms
Informational privacy - Westin's
definition - part 5
Personal Emotional
autonomy release
Limited &
Self-evaluation protected
Need to integrate communication
experiences into Share confidences and
meaningful
Westin, Alanpattern;
F. 1970. Privacy and freedom.
intimacies London:
only with those
essential
Bodley for creativity
Head. one trusts
Individual privacy versus
individual secrecy
Privacy Secrecy
Allowed and in some
cases required for Involves
socially-sanctioned acts. socially proscribed acts.
Stress reducing. Stress inducing.
Margulis, Stephen T. 1977. Conceptions of privacy: current status and next steps. Journal
of social issues 33(3):5-21, p. 10.
Margulis, Stephen T. 2003. Privacy as a social issue and behavioral concept. Journal of
social issues 59(2):243-261.
Election day
Us Us Us Us
Us
Them
On the network news:
Ayman al-Zawahiri
So you do a search . . .
A few days later . . .
How do
you feel?
Discussion question:
Why do we need
surveillance?
Need for surveillance (1)
Need for surveillance (2)
Need for surveillance (2)
Need for surveillance (2)
Train Depart Arrive
1 2:30 p.m. 6:30 p.m.
2 3:30 p.m. 8:00 p.m.
Zuboff, Shoshana. 1988. In the age of the smart machine: the future
of work and power. New York: Basic Books.
Roles of Surveillance (1)
Necessitated by technology
Facilitated by technology
Roles of surveillance (2)
Provision of services (Social Security)
Highly visible
Isolation and
Social control
observation
Foucault, Michel. 1995. Discipline and punish: the birth of the
prison. New York: Vintage Books.
Surveillance—Panopticon model
Jeremy Bentham
• Legal theorist
• Rationalism
• Utilitarianism
• Eccentric
Jeremy Bentham’s Panopticon
cells
entry
inspector’s
walkway lodge
Panopticon society
Stealth surveillance –
communication interception
1880s
1860s First reports
Wiretapping of Packet
during wiretaps sniffers
Civil War in press
What does this
have to do with
online searching?
Online searching – Google
One of
Google’s
servers
Sending your search request (1)
1 2 3
Sending your search request (2)
switch switch
switch
switch
switch
switch
Online searching
Server where
the database
resides
Packet-switched network
switch switch
switch
UH router switch
AT&T switch
switch
Mark Klein
former AT&T
technician
Secret room
https://www.eff.org/document/2013-06-06-wapo-prism
Edward Snowden
MUSCULAR – NSA and
GCHQ secretly raided
data from Google and
Yahoo
Edward Snowden
MUSCULAR
Edward Snowden
MUSCULAR
NSA used a variety
of methods to grab
data flowing
between Google’s
data centers.
http://washingtonpost.com
http://www.washingtonpost.com/world/national-
security/nsa-infiltrates-links-to-yahoo-google-data-centers-
worldwide-snowden-documents-
say/2013/10/30/e51d661e-4166-11e3-8b74-
d89d714ca4dd_story.html
Spy programs that we know of
PRISM
accessing Internet data of 9 major Internet
companies in the U.S.
MUSCULAR
Secretly broke into main communication links that
connect Yahoo and Google data centers around the
world
UPSTREAM
cable-tapping of fiber cables and infrastructure,
giving direct access to fiber-optic cables that carry
Internet and telephone traffic via AT&T, Verizon,
Sprint
Spy programs that we know of
SHELLTRUMPET
metadata program targeting international
communications
BULLRUN
program “to defeat encryption used in specific
network communication technologies”
Google fighting back
https://www.google.com/
Privacy in Libraries
ALA on Confidentiality
• The First Amendment’s guarantee of freedom
of speech and of the press requires that the
corresponding rights to hear what is spoken
and read what is written be preserved, free
from fear of government intrusion,
intimidation, or reprisal.
Informational Decisional
privacy privacy
Control of access to Freedom to make
information about a personal decisions
person or group of without interference
persons from government
Privacy Act of 1974 Roe v. Wade 1973
Gormley, Ken. 1992. One hundred years of privacy. Wisconsin law review
Sept/Oct 1992:1335-1441.
American Constitution
Amendment IX
The enumeration in the
Constitution of certain rights shall
not be construed to deny or
disparage others retained by the
people.
Fourth Amendment
The right of the people to be secure in
their persons, houses, papers, and
effects, against unreasonable searches
and seizures, shall not be violated, and
no Warrants shall issue, but upon
probable cause, supported by Oath or
affirmation, and particularly describing
the place to be searched, and the
persons or things to be seized.
Privacy an old concern
Halakhah (Jewish law)
Proscriptions on:
Physical intrusion
Visual surveillance
Aural surveillance
Talmud
Walls between houses to be a certain height
Creditor may not enter person’s house
Ancient Roman law (Justinian’s Pandects)
Prohibition against going into a home and
dragging out the person
Hippocratic oath
No disclosure of what in practice seen or heard
that “ought never be published abroad”
General warrants (1)
• No specific individual
• No specific crime
• No specific place to be searched
• No specific items to be sought
• Illegal according to Sir Edward Coke’s
Institutes of the Lawes of England (first
published 1642 and 1644)
• Illegality confirmed by Sir Matthew Hale
• Illegality confirmed by Sir William
Blackstone
General warrants (2)
• Suspicion of crime related to
government revenue
• Used against anyone who dared to
challenge or limit the authority of
Parliament or the crown
• John Wilkes (member of Parliament)
• Anonymously wrote critical essay
published in North Briton
• General warrant leads to massive
arrests, Wilkes ► Tower of London
Writs of assistance
• Any customs official could enter “any
House, shop, Cellar, Warehouse or
Room or other Place...”
• Seize unaccustomed goods
• Lasted for the life of the sovereign
under which it was issued plus six
months
1965
Griswold v. Connecticut
381 U.S. 479
1964-
U.S. Senate
Long Subcommittee
Hearings on surveillance
activities by federal agencies;
first looked at IRS
No warrantless wiretapping in
criminal cases
1967
Katz v. United States
389 U.S. 347
Congress Acts
1968
The Omnibus Crime Control
and Safe Streets Act of 1968
(“Federal Wiretapping Act“),
18 USC Section 2510 et seq.
1972
U.S. v. U.S. District Court
for the Eastern District of Michigan
“Keith”
1978
Foreign Intelligence
Surveillance Act
U.S. Code
50 USC Sections 1801-1863
Electronic mail
1993
ECPA
Electronic
Communications
Privacy Act
The Acronym
Uniting and Strengthening
America by Providing
Appropriate Tools Required to
Intercept and Obstruct
Terrorism
The USA PATRIOT Act
H.R. 3162
The Purpose
To deter and punish terrorist
acts in the United States and
around the world, to enhance
law enforcement investigatory
tools, and for other purposes.
The USA PATRIOT Act
The Language
SEC. 218. FOREIGN INTELLIGENCE
INFORMATION.
Sections 104(a)(7)(B) and section 303(a)
(7)(B) (50 U.S.C. 1804(a)(7)(B) and 1823(a)
(7)(B)) of the Foreign Intelligence
Surveillance Act of 1978 are each
amended by striking `the purpose' and
inserting `a significant purpose'.
The U.S. Code
Sections 104(a)(7)(B) and section 303(a)(7)(B) (50
U.S.C. 1804(a)(7)(B) and 1823(a)(7)(B)) of the Foreign
Intelligence Surveillance Act of 1978 are each
amended by striking `the purpose' and inserting `a
significant purpose'.
TITLE 50 > CHAPTER 36 > SUBCHAPTER I > § 1804.
Applications for court orders
(7) a certification …
(B) that a significant
the purpose of purpose of the
the surveillance is to
surveillance
obtain foreign is intelligence
to obtain foreign intelligence
information;
information;
Federal Wiretapping Act
1968
The Omnibus Crime Control
and Safe Streets Act of 1968
(“Federal Wiretapping Act”)
U.S. Code
18 USC Section 2510 et seq.
1978
Foreign Intelligence
Surveillance Act
U.S. Code
50 USC Sections 1801-1863
Investigative powers in US
Code
1968 1978
Foreign
Federal
Intelligence
Wiretapping Surveillance
Act Act
The USA PATRIOT Act
The Complaints— Records vulnerable
Section 215—Amending FISA 501(a)
The Director of the [FBI] or a designee of the
Director ... may make an application for an order
requiring the production of any tangible things
(including books, records, papers, documents, and
other items) for an investigation to protect against
international terrorism or clandestine intelligence
activities, provided that such investigation of a
United States person is not conducted solely upon
the basis of activities protected by the first
amendment to the Constitution.
The USA PATRIOT Act
The Complaints—Freedom of Speech
Section 215—Amending FISA 501(d)
No person shall disclose to any other
person (other than those persons
necessary to produce the tangible things
under this section) that the Federal
Bureau of Investigation has sought or
obtained tangible things under this
section.
Banks and Bowman theoretical
model
Associate General
Counsel for FBI
Crisis
National
Privacy
security
W W D
1928 1942 1942 1952 R
Olmstead Goldstein Goldman On Lee
W S E
1937/1938 1961 1967
Nardone Silverman Katz
W W D R
1928 1942 1942 1952
Olmstead Goldstein Goldman On Lee
W S E
1937/1938 1961 1967
Nardone Silverman Katz
W W D R
1928 1942 1942 1952
Olmstead Goldstein Goldman On Lee
W S E
1937/1938 1961 1967
Nardone Silverman Katz
Magna
Carta
Magna Carta 1215 cap. 39
No free man shall be seized or
imprisoned, or stripped of his
rights or possessions, or
outlawed or exiled, or deprived of
his standing in any other way, nor
will we proceed with force against
him, or send others to do so,
except by the lawful judgment of
Magna his equals or by the law of the
Carta land.
Reinterpreting the Magna Carta
Magna Carta No free man . . .
1215