Computers, Privacy & the Constitution

View   r4  >  r3  >  r2  >  r1
NatayaRahmawatiFirstPaper 4 - 06 May 2022 - Main.NatayaRahmawati
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Line: 31 to 31
 All of these problems occur primarily as the consequences of internet companies accumulate and retain abundant personal data and allow it to be transmitted everywhere without adequate security. We need a more stringent legal framework that requires these companies to safeguard our privacy and security. The current way of data collection needs to stop. Companies should not save data longer than absolutely necessary. Encrypt what has to be saved. Internet services with a better security design will promote better protection for users, regardless of government surveillance authority.

Changed:
<
<
The next step will be the legal fight to regain power over our privacy. There must be clear regulations that ensure we are being informed of when and how our data is collected, this is imperative. This way, mass surveillances without our consent could be minimized. In fact, surveillance must always be an exclusion, not the norm.
>
>
The next step will be the legal fight to regain power over our privacy. There must be clear regulations that ensure we are being informed of when and how our data is collected, this is imperative. This way, mass surveillances without our consent could be minimized. In fact, surveillance must always be an exception, not the norm.
 
Changed:
<
<
However, until such regimes come, self-regulation is the best bet that we have in hand. Fortunately, if we are willing to go the extra miles, it is possible to protect our private information in this data vultures era. Start practicing a more secure internet behavior by going incognito, learn how to use encrypted emails, choose products that are better for privacy, for example Signals. Always use VPN, clear cookies and flush your DNS, invest your time in how TOR and tails work, and of course, choose to refrain from social media. It is about time that we stand up for our privacy rights and be vigilant to restrict to whom we feed our personal information to.
>
>
However, until such regimes come, self-regulation is the best bet that we have in hand. Fortunately, if we are willing to go the extra miles, it is possible to protect our private information in this data vultures era. Start practicing a more secure internet behavior by going incognito, get familiar with encrypted emails, choose products that are better for privacy, for example Signals. Always use VPN, clear cookies and flush your DNS, invest your time to learn how TOR and tails work, and of course, choose to refrain from social media. It is about time that we stand up for our privacy rights and be vigilant to restrict to whom we feed our personal information to.
 


NatayaRahmawatiFirstPaper 3 - 06 May 2022 - Main.NatayaRahmawati
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

Living with the Data Vultures

Changed:
<
<
-- By NatayaRahmawati - 11 Mar 2022
>
>
-- By NatayaRahmawati - 6 May 2022
 
Deleted:
<
<
The ever-evolving development of internet and computer technology have transformed the way humans communicate with each other, as well as how businesses and the government interact with people. Technology and internet have been used in an unprecedented way for tracking, marketing and informing policies. Nowadays, what supposed to be our private data could be collected and even used against us unlawfully. The examples could be observed on how Cambridge Analytica harvested the data of up to 87 million Facebook profiles and engineered those data to provide analytical assistance to the 2016 presidential campaigns of Donald Trump, as well as the case where police in Virginia violated the Constitution by analyzing location data of Google users near a 2019 bank robbery, and also. Judge M. Hannah Lauck of the U.S. District Court for the Eastern District of Virginia said Thursday that the so-called geofence warrant violated the Fourth Amendment’s protections against unreasonable searches by accessing users’ location data without probable cause they might be suspects.
 
Changed:
<
<
Behind this escalated use of technology lays incredibly important issues: Why do we care about privacy and how do we protect it?
>
>
We are now living in a world where mass surveillance and information tracking take place in almost every aspect of society. Tech companies as well as the government are garnering our data every day. Popular services like emails, google, smartphones, facebook, instagram, and many other apps have been perceived as a normal part of living. However, many people fail to recognize (or choose to ignore the fact) that in exchange to use their free services, we give up a great portion of our personal information and privacy. This phenomenon raises important questions, what is the harm behind this mass surveillance and why we should be worried about it?
 
Added:
>
>
What’s So Special About Our Data and Privacy
 
Changed:
<
<
Personal Data Privacy: Specifying Why It Matters
>
>
Discussing surveillance cannot be separated from the importance of privacy. The right to privacy is the right to feel secure in our own thoughts, to be free from observation or disturbance, the right not to have one’s personal matters disclosed or publicized. It is a fundamental right protected by the Fourth Amendment of the Constitution. This also means that the governments are prohibited from conducting “unreasonable" searches and seizures without a warrant or probable cause.
 
Changed:
<
<
The right to privacy is the right not to have one's personal matters disclosed or publicized; the right to be left alone. It is the right against undue government intrusion into fundamental personal issues and decisions.
>
>
However, in 2013, Snowden revealed that the US government and other governments have been capturing and storing the metadata of their citizens. In other words, the governments are capable of accessing our private information, including personal communication, emails, locations, smartphones and internet activities, all without our consent. This extraordinary breadth of mass surveillance goes against the basic fundamental rights of privacy and there are more than strong reasons on why we should be worried about this.
 
Changed:
<
<
Privacy is crucial to freedom of thought, it unlocks the aspects of ourselves that are most intimate and at the same time most vulnerable. People who don’t have the best interest at heart will exploit our private data to further their own agenda. Privacy matters because the lack of it gives others power over us.
>
>
Some parties will argue that surveillance is important for crime control and prevention, and many people think that as an ordinary people, they have nothing to hide and nothing to fear. This is an ill narrative. Each of us have our own identity and presence of mind, we have plenty to hide and plenty to fear. Our private information that those big techs and the governments exhaustively collect could be used for far less benevolent agendas, not merely about target ads or security purposes. On the contrary, it could be used against ourselves. They abuse our data to find out about our whole identity, to whom we interact, trace our behavior, understand the way we think, map our political preferences, the list goes on.
 
Changed:
<
<
At this point many people might still think that they do not have to put much concern over data privacy because they think that they are nobody and thus their privacy is safe, nothing special, interesting, nor important to be known about them.
>
>
We are being spied on from every domain imaginable, regardless if we are a suspect criminal or innocent citizen. What is more concerning is that there is always a chance that we, or the people that we care about, fit into a certain unfavorable category. It might have something to do with our race, health condition, sexual preferences, educations, opinions or simply anything. All of this mass surveillance could be easily done without the individual being aware nor giving their consent, and this is far from acceptable.
 
Deleted:
<
<
Plenty people do not have awareness over data privacy because they thought as an ordinary citizen their privacy is safe; nothing special, interesting, nor important to be known about them. This is an ill narrative. Each of us have our attention and presence of mind, we have plenty to hide and plenty to fear. The data vultures want to know more about us so they can know how to best influence every aspect of our life. In terms of business and economics, the more personal data being collected by the big tech companies, the more they can anticipate every move that we take, influence us, and sell that influence to others. However, the real danger of data privacy breach is not merely about influencing us to spend money on stuff, but the huge possibilities that our information can so easily accumulated by the hands of parties whose motives are much less noble. A government, for example.

The mass agglomeration and analysis of personal data has empowered governments and prying companies. Governments today know more about their citizens than ever before. Intelligence agencies now possess much more information on all of the population. This kind of information allows governments the ability to subconsciously controls how we perceive information and policy, manipulate our behaviour, and worse, it enables them to foresee protests and even pre-emptively arrest people who plan to take part. Having the power to gain knowledge about organized resistance before it occurs, and being able to squeeze it in time, is a tyrant’s dream.

 

Where to Put Our Concern

Changed:
<
<
Lack of controls over our personal information, being tracked and monitored by companies and the government are the reality that we are living in. It is omnipresent, in every activities that we do from the moment that we open our eyes to the time when we sleep at night. Unless we are willing to put resistance into it, the data vultures will endlessly abuse their power to harvest our data to the point that we would be left with no choice but to give up privacy altogether. It is possible that at one point, the deceitful convenience of digital age goes from ‘only’ broadcasting our private lives through surveys and social media to the compulsory regulation to put all of our personal data online, without other mechanism where our data could be stored more safely. (E.g. census has been conducted online, schools reduced into a mere zoom session where everything is recorded, all without the guarantee of data security).
>
>
Governments today know more about their citizens than ever before. Intelligence agencies possess much more information on all of the population. Having the access to this magnitude of information is every tyrant could ever dreamed of. This kind of information allows governments the ability to subconsciously control how we perceive information and policies. It enables them to identify different behavior and therefore, surveillance can have a chilling effect on people. The knowledge, or even the perception that we are being watched over our shoulder affects the way we behave as a society. It drives people to conform to a certain standard, or in other words it manipulates our behavior and reduces our freedom of expression. When taken into a larger context, mass surveillance allows the government to identify opposing opinions, they could foresee protests and even pre-emptively arrest people who plan to take part.

If we do not fight to proclaim the autonomy of our privacy, it is just a matter of time until it translates into oppression and total control of society. We never know who will be in power next and the next one might not be as benign as their predecessor. That being said, it is important that this state power is being curtailed.

 
Changed:
<
<
The abuse of power in relation to surveillance evoke the notion that power needs to be curtailed for it to be a positive influence in society. Even if you still think that there is nothing wrong with what tech companies and governments are doing with our data, we should still want power to be limited. We never know who will be in power next and the next people in power might not be as benevolent as those we have seen thus far.
>
>
What We Can Do About It
 
Changed:
<
<
At the time where there is no clear distinction between government and corporate surveillance, self-regulation is our best bet that we have in hands. Refraining from using tech altogether might be unrealistic for most people, but there are ways to reclaim the data that sustains it, and we can limit them collecting new data. Choose products that are better for privacy, leave social media, use privacy extensions on our browsers. Do not turn on phone’s wi-fi, bluetooth and locations services when we don’t need them. Use the legal tools at our disposal to ask companies for the data they have on us, and ask them to delete that data. Change our settings to protect our privacy, refrain from connecting contacts to any application at all times. Although it is easily said than done, but never give in to the data economy without at least some resistance.
>
>
All of these problems occur primarily as the consequences of internet companies accumulate and retain abundant personal data and allow it to be transmitted everywhere without adequate security. We need a more stringent legal framework that requires these companies to safeguard our privacy and security. The current way of data collection needs to stop. Companies should not save data longer than absolutely necessary. Encrypt what has to be saved. Internet services with a better security design will promote better protection for users, regardless of government surveillance authority.
 
Added:
>
>
The next step will be the legal fight to regain power over our privacy. There must be clear regulations that ensure we are being informed of when and how our data is collected, this is imperative. This way, mass surveillances without our consent could be minimized. In fact, surveillance must always be an exclusion, not the norm.
 
Changed:
<
<
The first step to making this draft better is an exacting edit. There are way too many words here doing almost nothing. First remove every word that isn't pulling weight. When all the slack words and empty phrases are gone, rewrite every sentence using fewer words and simpler grammar. Your statement of the problem of commodity services offered in the cloud in return for personal behavior exhaustively collected by the smartassphone can be sharpened down to a sentence or two. You might want to refer to my discussion of the present situation in last term's ClassAudio.
>
>
However, until such regimes come, self-regulation is the best bet that we have in hand. Fortunately, if we are willing to go the extra miles, it is possible to protect our private information in this data vultures era. Start practicing a more secure internet behavior by going incognito, learn how to use encrypted emails, choose products that are better for privacy, for example Signals. Always use VPN, clear cookies and flush your DNS, invest your time in how TOR and tails work, and of course, choose to refrain from social media. It is about time that we stand up for our privacy rights and be vigilant to restrict to whom we feed our personal information to.
 
Deleted:
<
<
The present draft refers to the effects on state power that result from the collection of personal data as payment for "free" services provided in what we might call the Concentrated Cloud. This is the real subject of this course, and it would be good to take more thought for it in the next draft. You effort to discuss technical changes in personal computing that would address the problem of the Concentrated Cloud is sorely lacking, consisting as it does of changes to smartassphone configuration, which addresses neither the cloud nor the endpoint components of the Net effectively. As I tried to show in 2009 in Freedom in the Cloud and have been discussing in this class in recent weeks, a privacy-respecting personal cloud and safer endpoints is eminently possible. The supposed dichotomy between using no "tech" and inadequate measures that don't address fundamental issues requires interrogation.
 



NatayaRahmawatiFirstPaper 2 - 04 Apr 2022 - Main.EbenMoglen
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Deleted:
<
<
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
 Living with the Data Vultures
Line: 34 to 33
 At the time where there is no clear distinction between government and corporate surveillance, self-regulation is our best bet that we have in hands. Refraining from using tech altogether might be unrealistic for most people, but there are ways to reclaim the data that sustains it, and we can limit them collecting new data. Choose products that are better for privacy, leave social media, use privacy extensions on our browsers. Do not turn on phone’s wi-fi, bluetooth and locations services when we don’t need them. Use the legal tools at our disposal to ask companies for the data they have on us, and ask them to delete that data. Change our settings to protect our privacy, refrain from connecting contacts to any application at all times. Although it is easily said than done, but never give in to the data economy without at least some resistance.
Added:
>
>
The first step to making this draft better is an exacting edit. There are way too many words here doing almost nothing. First remove every word that isn't pulling weight. When all the slack words and empty phrases are gone, rewrite every sentence using fewer words and simpler grammar. Your statement of the problem of commodity services offered in the cloud in return for personal behavior exhaustively collected by the smartassphone can be sharpened down to a sentence or two. You might want to refer to my discussion of the present situation in last term's ClassAudio.

The present draft refers to the effects on state power that result from the collection of personal data as payment for "free" services provided in what we might call the Concentrated Cloud. This is the real subject of this course, and it would be good to take more thought for it in the next draft. You effort to discuss technical changes in personal computing that would address the problem of the Concentrated Cloud is sorely lacking, consisting as it does of changes to smartassphone configuration, which addresses neither the cloud nor the endpoint components of the Net effectively. As I tried to show in 2009 in Freedom in the Cloud and have been discussing in this class in recent weeks, a privacy-respecting personal cloud and safer endpoints is eminently possible. The supposed dichotomy between using no "tech" and inadequate measures that don't address fundamental issues requires interrogation.

 
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.

NatayaRahmawatiFirstPaper 1 - 12 Mar 2022 - Main.NatayaRahmawati
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="FirstPaper"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Living with the Data Vultures

-- By NatayaRahmawati - 11 Mar 2022

The ever-evolving development of internet and computer technology have transformed the way humans communicate with each other, as well as how businesses and the government interact with people. Technology and internet have been used in an unprecedented way for tracking, marketing and informing policies. Nowadays, what supposed to be our private data could be collected and even used against us unlawfully. The examples could be observed on how Cambridge Analytica harvested the data of up to 87 million Facebook profiles and engineered those data to provide analytical assistance to the 2016 presidential campaigns of Donald Trump, as well as the case where police in Virginia violated the Constitution by analyzing location data of Google users near a 2019 bank robbery, and also. Judge M. Hannah Lauck of the U.S. District Court for the Eastern District of Virginia said Thursday that the so-called geofence warrant violated the Fourth Amendment’s protections against unreasonable searches by accessing users’ location data without probable cause they might be suspects.

Behind this escalated use of technology lays incredibly important issues: Why do we care about privacy and how do we protect it?

Personal Data Privacy: Specifying Why It Matters

The right to privacy is the right not to have one's personal matters disclosed or publicized; the right to be left alone. It is the right against undue government intrusion into fundamental personal issues and decisions.

Privacy is crucial to freedom of thought, it unlocks the aspects of ourselves that are most intimate and at the same time most vulnerable. People who don’t have the best interest at heart will exploit our private data to further their own agenda. Privacy matters because the lack of it gives others power over us.

At this point many people might still think that they do not have to put much concern over data privacy because they think that they are nobody and thus their privacy is safe, nothing special, interesting, nor important to be known about them.

Plenty people do not have awareness over data privacy because they thought as an ordinary citizen their privacy is safe; nothing special, interesting, nor important to be known about them. This is an ill narrative. Each of us have our attention and presence of mind, we have plenty to hide and plenty to fear. The data vultures want to know more about us so they can know how to best influence every aspect of our life. In terms of business and economics, the more personal data being collected by the big tech companies, the more they can anticipate every move that we take, influence us, and sell that influence to others. However, the real danger of data privacy breach is not merely about influencing us to spend money on stuff, but the huge possibilities that our information can so easily accumulated by the hands of parties whose motives are much less noble. A government, for example.

The mass agglomeration and analysis of personal data has empowered governments and prying companies. Governments today know more about their citizens than ever before. Intelligence agencies now possess much more information on all of the population. This kind of information allows governments the ability to subconsciously controls how we perceive information and policy, manipulate our behaviour, and worse, it enables them to foresee protests and even pre-emptively arrest people who plan to take part. Having the power to gain knowledge about organized resistance before it occurs, and being able to squeeze it in time, is a tyrant’s dream.

Where to Put Our Concern

Lack of controls over our personal information, being tracked and monitored by companies and the government are the reality that we are living in. It is omnipresent, in every activities that we do from the moment that we open our eyes to the time when we sleep at night. Unless we are willing to put resistance into it, the data vultures will endlessly abuse their power to harvest our data to the point that we would be left with no choice but to give up privacy altogether. It is possible that at one point, the deceitful convenience of digital age goes from ‘only’ broadcasting our private lives through surveys and social media to the compulsory regulation to put all of our personal data online, without other mechanism where our data could be stored more safely. (E.g. census has been conducted online, schools reduced into a mere zoom session where everything is recorded, all without the guarantee of data security).

The abuse of power in relation to surveillance evoke the notion that power needs to be curtailed for it to be a positive influence in society. Even if you still think that there is nothing wrong with what tech companies and governments are doing with our data, we should still want power to be limited. We never know who will be in power next and the next people in power might not be as benevolent as those we have seen thus far.

At the time where there is no clear distinction between government and corporate surveillance, self-regulation is our best bet that we have in hands. Refraining from using tech altogether might be unrealistic for most people, but there are ways to reclaim the data that sustains it, and we can limit them collecting new data. Choose products that are better for privacy, leave social media, use privacy extensions on our browsers. Do not turn on phone’s wi-fi, bluetooth and locations services when we don’t need them. Use the legal tools at our disposal to ask companies for the data they have on us, and ask them to delete that data. Change our settings to protect our privacy, refrain from connecting contacts to any application at all times. Although it is easily said than done, but never give in to the data economy without at least some resistance.


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 4r4 - 06 May 2022 - 18:37:00 - NatayaRahmawati
Revision 3r3 - 06 May 2022 - 16:50:05 - NatayaRahmawati
Revision 2r2 - 04 Apr 2022 - 16:07:04 - EbenMoglen
Revision 1r1 - 12 Mar 2022 - 01:13:36 - NatayaRahmawati
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM