Should Digital Privacy be a Priviledge Over Security?

1731 words (7 pages) Essay in Technology

23/09/19 Technology Reference this

Disclaimer: This work has been submitted by a student. This is not an example of the work produced by our Essay Writing Service. You can view samples of our professional work here.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UK Essays.

Should we privilege digital privacy over national security?

I will be speaking on whether or not we should consider privacy over national security from the perspective of the European Union. First, we will look at how digital privacy and national security is in the status quo and then what the effect of privileging digital privacy would be. This topic piqued my interest because of the unfortunate terrorist attacks that have occurred right here in the past year. I specifically chose this discussion after finding out from some brief research that the US and EU have very closely intertwined surveillance systems, thus leading me to wonder what the effect of the EU’s perspective would be.

Currently, the stance of the EU is that personal data should only be processed where it isn’t reasonably feasible to carry out the processing in another manner.  According to Statista, Terror attacks in the EU have remained stagnant despite the large efforts made to decrease them.   The Washington post furthers, that deaths per month from terrorist attacks have slowly been increasing in Europe. With the constant advancement of technology, anti-terrorism efforts will always get better. Unfortunately, they also may get worse because of this uncontrollable advancement. 

 

Furthermore, Newsweek reports that over 220 million pieces of metadata are collected per day in just Germany alone. Thus, the William Davidson Institute writes that digital privacy in the EU is essentially non-existent. One reason they are in a position to collect such large amounts of data is that of a law that allows them to force companies to store communication data. Unfortunately, according to Forbes, these practices actually break the laws of mass surveillance, violating the basic privacy of citizens.

 

Ever since the September 11 attacks, the US has been on high guard in order to try to prevent any future terrorist attacks. According to Reuters, the EU has stepped up in a similar way, as they often copy much of the surveillance methods used by the American NSA. In fact, Pierre Berthelet of The Conversation writes in 2017 that the EU has ramped up data collection, has attempted to coordinate strategy better, and has increased cooperation with international bodies in an attempt to decrease terrorism. Unfortunately, all of these have direct implications in increasing the amount of data collected and the availability of that data.

The EFF reports in 2017,  that mass surveillance has almost no national security purposes. This is because “Traditional national security threats… are now “privatized” through terrorist networks”. Because of this, an increase in data collection and surveillance would actually be very harmful for national security. Unfortunately, methods of surveillance all over the world use very “rudimentary tools” against these attacks. Because of this, much surveillance and collection of data on the part of governments under the EU become quite useless and just an invasion of privacy. In fact, according to Slate in 2014, surveillance is so ineffective that it makes the jobs of security services much more difficult, all the while making us less secure.

There are three reasons for this being true. First, is that even if a security system has a false positive rate of 1 in 1000 – which no security technology comes anywhere near—every time you asked it for suspects in the U.K. it would flag 60,000 innocent people. Second, is that terrorist attacks are often very different from each other, making them very hard to predict, as anti-terror technology won’t be able to recognize a pattern between attacks. Third, is that anyone deciding whether or not something matches the criteria for a terrorist attack would have a wild amount of bias affecting their opinion, making any manual anti-terror operations unreliable. Because of these anti-terror methods, not only are they ineffective, but they waste trillions of dollars in funding that could go elsewhere.

Problematically, cyberterrorism is yet another issue that will hinder the effectiveness of anti-terror measures. If history shows anything, it is very possible that data may be accessed by a party that should not have that access. Because of this, data collection may sometimes even be a disadvantage, as terrorists may be able to get the collected data and use it to their advantage. The Data Center Journal explains, that this is because with more data, there are more people that need to gain access to secure data in order to properly manage it, thus making it less secure and more prone to attacks. This is extremely problematic for the EU, as Jon Peha of Carnegie Mellon University explains that these data breaches make government infrastructure extremely vulnerable to attacks, which have the possibility to disrupt the whole of the population

In order to increase security and prevent terror in the EU, there are two very promising solutions. First, they must invest more in resilience. According to the European Free Alliance, trillions of dollars have been wasted on anti-terror military programs that could be used much more effectively. In fact, the Radicalisation Awareness Network suggests that “for each euro spent in security measures and external operations, one should be spent on social cohesion, violence prevention and education programs.” This is largely because according to the Journal of Conflict Resolution, education creates more educated people, which discourages terrorism. The New York Times quantifies, that formal education leads to a 16% decrease in the likelihood that kids would get themselves involved in violence. However, they continue in saying this education must also coincide with civic engagement like volunteering and after school activities. Another possible solution would be to get to the root of terror by preventing the financing of terrorist groups. This can be done by following suspicious transactions of money as well as “tightening the rules on virtual currency platforms and anonymous prepaid cards.” This would be especially effective, as it has a direct effect on terrorism.

The current anti-terror methods in the EU seem to have no effect at the moment even though large amounts of data are collected. This is extremely bad, because any increase in data collection will further the likelihood of a data breach, which would be detrimental to their infrastructure, but would also continue to waste money on inefficient tools. The prioritization of digital privacy will have many effects on the citizens of the European Union not only socially, but also economically, as it would better privacy while also being more economical with spending. With the large amounts of money saved in doing this, terrorism can be fought even more effectively by either increasing rates of formal education or by tightening restrictions on anonymous currencies.

Sources:

  • European Commision (2018, August 1). How much data can be collected? Retrieved from https://ec.europa.eu/info/law/law-topic/data-protection/reform/rules-business-and-organisations/principles-gdpr/how-much-data-can-be-collected_en
  • Corrigan, Ray (2017, January 25). It Is Statistically Impossible for Mass Surveillance to Be an Effective Anti-Terrorism Tool Retrieved from https://slate.com/technology/2015/01/mass-surveillance-against-terrorism-gathering-intelligence-on-all-is-statistically-ineffective.html
  • Schneier, Bruce (2015, March 23). Why Mass Surveillance Can’t, Won’t, And Never Has Stopped A Terrorist Retrieved from http://digg.com/2015/why-mass-surveillance-cant-wont-and-never-has-stopped-a-terrorist
  • Heath, Ryan, (2018, November 21). Inside the hunt for the world’s most dangerous terrorist Retrieved from https://www.politico.eu/article/junaid-hussain-isis-islamic-state-hacker-inside-the-hunt-for-the-worlds-most-dangerous-terrorist/
  • Gaudot, Edouard (2018, June 6). 10 proposals to target terrorism at EU level Retrieved from https://www.greens-efa.eu/en/article/document/id-10-proposals-to-target-terrorism-at-eu-level/Sandler, Todd (2017, March 6). Gender Imbalance and Terrorism in Developing Countries Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5308407/
  • Tesfaye, Beza (2017, January 5). Education alone doesn’t prevent terrorism. Here’s what else you need. Retrieved from https://www.washingtonpost.com/news/monkey-cage/wp/2017/01/05/education-alone-doesnt-prevent-violent-extremism-heres-what-else-you-need/?noredirect=on
  • Woollacott, Emma (2018, June 25). EU Nations ‘Still Breaking The Law On Mass Surveillance’ Retrieved from https://www.forbes.com/sites/emmawoollacott/2018/06/25/eu-nations-still-breaking-the-law-on-mass-surveillance/
  • Md Staff (2018, March 23). How to stop terrorism: EU measures explained Retrieved from https://moderndiplomacy.eu/2018/03/23/how-to-stop-terrorism-eu-measures-explained/
  • Nye, Joseph (2016, February 8). Has the threat of terrorism in the US been blown out of proportion? Retrieved from https://www.weforum.org/agenda/2016/02/has-the-threat-of-terrorism-in-the-us-been-blown-out-of-proportion/
  • AFP (2015, July 7). Encryption ‘backdoors’ will open for criminals as well as governments: experts Retrieved from https://www.timeslive.co.za/news/sci-tech/2015-07-07-encryption-backdoors-will-open-for-criminals-as-well-as-governments-experts/
  • Clark, Jeff (2014, February 20). Big Data: Bigger Security Risks? Retrieved from http://webcache.googleusercontent.com/search?q=cache:2G-fltRBZWoJ:www.datacenterjournal.com/big-data-bigger-security-risks/+&cd=1&hl=en&ct=clnk&gl=us
  • Peha, Jon (2013, October 4). The Dangerous Policy of Weakening Security to Facilitate Surveillance. Retrieved from https://users.ece.cmu.edu/~peha/Peha_on_weakened_secuirty_for_surveillance.pdf

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have the essay published on the UK Essays website then please: