<< Chapter < Page Chapter >> Page >

Privacy of communications and property

Another example of heightened concerns about privacy in the modern era is the reality that society is under pervasive surveillance. In the past, monitoring the public was difficult at best. During the Cold War, regimes in the Soviet bloc employed millions of people as domestic spies and informants in an effort to suppress internal dissent through constant monitoring of the general public. Not only was this effort extremely expensive in terms of the human and monetary capital it required, but it also proved remarkably ineffective. Groups like the East German Stasi and the Romanian Securitate were unable to suppress the popular uprisings that undermined communist one-party rule in most of those countries in the late 1980s.

Technology has now made it much easier to track and monitor people. Police cars and roadways are equipped with cameras that can photograph the license plate of every passing car or truck and record it in a database; while allowing police to recover stolen vehicles and catch fleeing suspects, this data can also be used to track the movements of law-abiding citizens. But law enforcement officials don’t even have to go to this much work; millions of car and truck drivers pay tolls electronically without stopping at toll booths thanks to transponders attached to their vehicles, which can be read by scanners well away from any toll road or bridge to monitor traffic flow or any other purpose ( [link] ). The pervasive use of GPS (Global Positioning System) raises similar issues.

A photo of an E-Z Pass attached to the inside of a car windshield.
One form of technology that has made it easier to potentially monitor people’s movements is electronic toll collection, such as the E-ZPass system in the Midwest and Northeast, FasTrak in California, and I-Pass in Illinois. (credit: modification of work by Kerry Ceszyk)

Even pedestrians and cyclists are relatively easy to track today. Cameras pointed at sidewalks and roadways can employ facial recognition software to identify people as they walk or bike around a city. Many people carry smartphones that constantly report their location to the nearest cell phone tower and broadcast a beacon signal to nearby wireless hotspots and Bluetooth devices. Police can set up a small device called a Stingray that identifies and tracks all cell phones that attempt to connect to it within a radius of several thousand feet. With the right software, law enforcement and criminals can remotely activate a phone’s microphone and camera, effectively planting a bug in someone’s pocket without the person even knowing it.

These aren’t just gimmicks in a bad science fiction movie; businesses and governments have openly admitted they are using these methods. Research shows that even metadata—information about the messages we send and the calls we make and receive, such as time, location, sender, and recipient but excluding their content—can tell governments and businesses a lot about what someone is doing. Even when this information is collected in an anonymous way, it is often still possible to trace it back to specific individuals, since people travel and communicate in largely predictable patterns.

Questions & Answers

how do you get the 2/50
Abba Reply
number of sport play by 50 student construct discrete data
Aminu Reply
width of the frangebany leaves on how to write a introduction
Theresa Reply
Solve the mean of variance
Veronica Reply
Step 1: Find the mean. To find the mean, add up all the scores, then divide them by the number of scores. ... Step 2: Find each score's deviation from the mean. ... Step 3: Square each deviation from the mean. ... Step 4: Find the sum of squares. ... Step 5: Divide the sum of squares by n – 1 or N.
kenneth
what is error
Yakuba Reply
Is mistake done to something
Vutshila
Hy
anas
hy
What is the life teble
anas
hy
Jibrin
statistics is the analyzing of data
Tajudeen Reply
what is statics?
Zelalem Reply
how do you calculate mean
Gloria Reply
diveving the sum if all values
Shaynaynay
let A1,A2 and A3 events be independent,show that (A1)^c, (A2)^c and (A3)^c are independent?
Fisaye Reply
what is statistics
Akhisani Reply
data collected all over the world
Shaynaynay
construct a less than and more than table
Imad Reply
The sample of 16 students is taken. The average age in the sample was 22 years with astandard deviation of 6 years. Construct a 95% confidence interval for the age of the population.
Aschalew Reply
Bhartdarshan' is an internet-based travel agency wherein customer can see videos of the cities they plant to visit. The number of hits daily is a normally distributed random variable with a mean of 10,000 and a standard deviation of 2,400 a. what is the probability of getting more than 12,000 hits? b. what is the probability of getting fewer than 9,000 hits?
Akshay Reply
Bhartdarshan'is an internet-based travel agency wherein customer can see videos of the cities they plan to visit. The number of hits daily is a normally distributed random variable with a mean of 10,000 and a standard deviation of 2,400. a. What is the probability of getting more than 12,000 hits
Akshay
1
Bright
Sorry i want to learn more about this question
Bright
Someone help
Bright
a= 0.20233 b=0.3384
Sufiyan
a
Shaynaynay
How do I interpret level of significance?
Mohd Reply
It depends on your business problem or in Machine Learning you could use ROC- AUC cruve to decide the threshold value
Shivam
how skewness and kurtosis are used in statistics
Owen Reply
yes what is it
Taneeya
Got questions? Join the online conversation and get instant answers!
Jobilize.com Reply

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, American government. OpenStax CNX. Dec 05, 2016 Download for free at http://cnx.org/content/col11995/1.15
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'American government' conversation and receive update notifications?

Ask