Query Result Set
Skip Navigation Links
   ActiveUsers:828Hits:18947646Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
COUNTERVAILING FORCES (2) answer(s).
 
SrlItem
1
ID:   130992


Data protection, with love / Bellanova, Rocco   Journal Article
Bellanova, Rocco Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract How to Engage with the Politics of Privacy in the Age of Preemptive Security? My suggestion is to start with data protection, which, following De Hert and Gutwirth (2006), is not exactly the same of privacy. Extrapolating from their analysis of the two as different "legal tools," I would say that privacy and data protection are two slightly different rationales of power relations: one of privacy based on the "opacity of the individual" and one of data protection on the "transparency and accountability of the powerful" (Gutwirth and De Hert 2008:275; emphasis in original).1 These rationales (attempt to) orientate two different loose dispositifs, each formed by a composite ensemble of elements. Some of these elements are peculiar to each dispositif, while others are shared or encompassed by both
        Export Export
2
ID:   130991


Security and the claim to privacy / Amoore, Louise   Journal Article
Amoore, Louise Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract When US President Barack Obama publicly addressed the data mining and analysis activities of the National Security Agency (NSA), he appealed to a familiar sense of the weighing of the countervailing forces of security and privacy. "The people at the NSA don't have an interest in doing anything other than making sure that where we can prevent a terrorist attack, where we can get information ahead of time, we can carry out that critical task," he stated. "Others may have different ideas," he suggested, about the balance between "the information we can get" and the "encroachments on privacy" that might be incurred (Obama 2013). In many ways, conventional calculations of security weigh the probability and likelihood of a future threat on the basis of information gathered on a distribution of events in the past. Obama's sense of a trading-off of security and privacy shares this sense of a calculation of the tolerance for the gathering of data on past events in order to prevent threats in the future. In fact, though, the very NSA programs he is addressing precisely confound the weighing of probable threat, and the conventions of security and privacy that adhere to strict probabilistic reasoning. The contemporary mining and analysis of data for security purposes invites novel forms of inferential reasoning such that even the least probable elements can be incorporated and acted upon. I have elsewhere described these elements of possible associations, links, and threats as "data derivatives" (Amoore 2011) that are decoupled from underlying values and do not meaningfully belong to an identifiable subject. The analysis of data derivatives for security poses significant difficulties for the idea of a data subject with a recognizable body of rights to privacy, to liberty, and to justice. Consider, for example, two years before the controversies surrounding NSA and the PRISM program, when the US Director of National Intelligence, James Clapper, testified before the joint hearing of committees on the virtues of the algorithmic piecing together of fragments of data:
        Export Export