Ethics of Encryption
Effects of Encryption on the Constitution of the United States of America
In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater. However, the effects of encryption on our lifestyle and the government's role in encryption has been (and will continue to be) debated for years to come.
The United States (U.S.) Constitution was drafted to prescribe to the American people, government's powers and limitations. In the form of the Bill of Rights, the people's rights were added to the Constitution to make the document complete and to ensure that the U.S. government does not hold the power to oppress the citizens of this country. The right to privacy, though never specifically mentioned in the Constitution, has been interpreted by the U.S. Supreme Court from the First, Fourth, and Fifth Amendments as well as many other passages in the document. These three amendments are the focus of the debate over encryption. Does the government's plan to limit encryption have an adverse effect on the citizens' rights to free speech, protection from unlawful searches and seizures, or self-incrimination?
There are many terms which have been introduced by the field of encryption. Each of these terms are need to understand this discussion. Plaintext is the original document to be transmitted or stored on a computer system. Ciphertext is the encrypted document. ...
... middle of paper ...
... Case for 'Clipper'." Technology Review. July 1995: 48-55.
Dorman, Lester et al. "Digital Privacy." http://rescomp.stanford.edu/~pweston/privacy.html. December 1995.
Froomkin, A. Michael. "The Metaphor is the Key: Cryptography, The Clipper Chip, and the Constitution." http://www-swiss.ai.mit.edu/6095/articles/froomkin-metaphor/text.html. December 1995.
Henick, Ben. "The Constitution of the United States." www.csum.edu/A_S/History/docs/usacon.html." December 1995.
Licquia, Jeff. "PGP Frequently Asked Questions." http://www.prairenet.org/~jalicqui/pgpfaq.txt. December 1995.
Litterio, Francis. "Statement of Rep. Jack Brooks (D-TX)." http://draco.centerline.com:8080/~Efranl/clipper/brooks-statement.html. December 1995.
Morton, Bill. "The Beginner's Guide to Pretty Good Privacy." ftp://ftp.prairenet.org/pub/providers/pgp/pgpbg11.asc. December 1995.
Privacy comes at a cost. It brings people who fight for the people the privacy of others when it is violated together. Cops not being able to search when they seize a cell phone makes them risk their lives because how people these days are, there could be bombs in the phone. Even though this amendment was ratified, people to this day still don’t have privacy they rightfully deserve. This effects me because I’m able to keep special information to myself. Also, if a police pulls over a family member and ask for their phone to investigate without giving a proper reason or having a warrant, that family member could say no. If a police hasn’t given you a good reason to hand something over, you have the right to resist or else the police are being unconstitutional. This amendment gives people the safety to do what they want(that’s legal). It also makes life better, but harder. Life is harder with this amendment because you have to watch out for who you trust that they won’t do anything to jeopardize your safety. This is relevant because a man in Indiana was tracked down by a GPS. It didn’t violate his 4th Amendment because the police got a warrant to put a tracking device in his mom’s car. This case represents how technology gives advantages and disadvantages. An advantage was that they were able to track him down for a burglary. The disadvantage would be that if they hadn’t gotten a warrant, he could have filed a lawsuit against
According to the Fourth Amendment, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.” Without the Fourth Amendment, people would have no rights over their own personal privacy. Police officers could just enter people’s houses and take anything that they could use as evidence and use it against them. With the advancement in today’s technology, it is getting more and more difficult to define what exactly privacy is to us, and whether or not the Fourth Amendment protects it.
Edward Snowden is America’s most recent controversial figure. People can’t decide if he is their hero or traitor. Nevertheless, his leaks on the U.S. government surveillance program, PRISM, demand an explanation. Many American citizens have been enraged by the thought of the government tracing their telecommunication systems. According to factbrowser.com 54% of internet users would rather have more online privacy, even at the risk of security (Facts Tagged with Privacy). They say it is an infringement on their privacy rights of the constitution. However, some of them don’t mind; they believe it will help thwart the acts of terrorists. Both sides make a good point, but the inevitable future is one where the government is adapting as technology is changing. In order for us to continue living in the new digital decade, we must accept the government’s ability to surveil us.
“Many opponents have come to see the patriot act as a violation of the fourth amendment to the U. S constitution.” (Belanger, Newton 2). The side effect of the patriot act is that it weakens many rights. This act weakens the fourth amendment which is our privacy protection. The fourth amendment allows citizens to be protected from unreasonable searches without a warrant. The police search suspects mainly because of their race or ethnic group.
“The Fourth Amendment wasn't written for people with nothing to hide any more than the First Amendment was written for people with nothing to say.” (Dave Krueger). The Fourth Amendment protects the people's values, including the right of privacy. The Fourth Amendment includes, “The right of the people to be secure in their persons, houses, paper, effects, against unreasonable searches and seizure, shall not be violated.” When the founding fathers created the Constitution they ensured the people fundamental laws that would be used to any issue portrayed in the Supreme Court. That gave the people a relief that no one is ever above the law that is created. The privacy of the people was a very big value enforced by warrants. In the case of the
Don’t put it on the internet, although I guess some people would! “Don Tapscott can see the future coming ... and works to identify the new concepts we need to understand in a world transformed by the Internet.” (“Don Tapscott” Ted Conferences LLC) Tapscott is an Adjunct Professor of Management at the Rotman School of Management and the Inaugural Fellow at the Martin Prosperity Institute. In 2013, Tapscott was appointed Chancellor of Trent University. He has written extensively on the topic of information security in the digital age over the past fifteen years. In his essay entitled, “Should We Ditch the Idea of Privacy?”(Tapscott p.117). Tapscott considers a new, emerging theory
The word “privacy” did not grow up with us throughout history, as it was already a cultural concept by our founding fathers. This term was later solidified in the nineteenth century, when the term “privacy” became a legal lexicon as Louis Brandeis (1890), former Supreme Court justice, wrote in a law review article, that, “privacy was the right to be let alone.” As previously mentioned in the introduction, the Supreme Court is the final authority on all issues between Privacy and Security. We started with the concept of our fore fathers that privacy was an agreed upon concept that became written into our legal vernacular. It is being proven that government access to individual information can intimidate the privacy that is at the very center of the association between the government and the population. The moral in...
Solove, Daniel J. “5 Myths about Privacy” Washington Post: B3. Jun 16 2013. SIRS. Web. 10
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
Data Encryption is from the cryptography science, which includes coding and decoding of message to protect the safety. Development computer technology makes the encryption even more complicated. The ability for people to break codes is increasing, so are the ability to guard the codes. Many encryptions are available now. They were developed by some hi-tech company and sold, or you can choose some free service. Actually, when you are using the web browsers, emails, or even the basic system, your information has been automatically encrypted.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The question of whether an action or choice is ethical or not is fundamentally based on whether something is right or wrong. From an ethical standpoint, unethical choices and risky behavior can lead to increased liabilities. The liabilities result in the loss or damage sustained by a company or other party as result of an unethical and sometimes illegal decision. Although we exercise free will on a continuous basis, we are governed by the decisions we make and my belief is that the decisions we make daily do not just affect us. These decisions affect other people, such as family, friends, coworkers, instructors, neighbors, etc. The most prominent example of ethics can be recognized in the field of technology based on the growing amount of rapidly changing legislation and acts that under consideration in order to protect people from unethical practices.
Powell, Robert. "Four Ways Technology Invades Your Privacy." Lovemoney.com. N.p., 5 Oct. 2011. Web. 15 Apr. 2014.
Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. For example, it is crucial for businesses to keep information they have secure so that hackers can't access the information. Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions.
I think there is a right to privacy. What privacy means is “the right to be left alone, or freedom from interference or intrusion” (IAPP,1). Every American citizen has the right to privacy whether it be privacy in their homes, the words in their emails, or daily activities. But not only do the American people have the right to privacy from other citizens, we also have the right to privacy from the government. If the government can keep their conversations, actions and secrets under lock and key then Americans can as well. But unfortunately, the Constitution does not explicitly say anything about “privacy” for the American people, it is left for open interpretation in multiple amendments. The main amendment that screams “privacy” is the fourth amendment.