Computers, Privacy & the Constitution
Public awareness of protecting one’s privacy The speed of the fast-changing technology and the development of the current law system can hardly meet at the same time. Along the development of social network services (SNS), the concepts of protecting of privacy are becoming dramatically complex and hard to chase. Yet, it is our responsibility as citizens to protect our own privacy by being well aware of what rights we have thus speak for ourselves.

Rising big brothers In George Orwell’s novel, 1984, there is a mysterious dictator called “Big Brother” that exercises strong influence for its own good over the inhabitants where everyone is under complete surveillance by the authorities. The people are continuously reminded of this by the phrase “Big Brother is watching you.” Orwell’s insights into the future world characterized in his novel turns out to be true and accurate. Further, he must be one of the greatest prophets considering that “1984” was written in 1949.

Along with technological revolution since then, everyone is now seamlessly connected through the internet which also implies that it is extremely easy to monitor someone if a person decides to do so. Not to mention, SNS bring us a whole new way of communication by providing instantaneous and effective tools. However, these SNS are only beneficial when there are no concerns of protecting one’s privacy mainly under the Fourth Amendment. Though our means of communicating technology are amazingly evolved at high-speed, public awareness in protecting one’s privacy has not yet been matured at the same speed with a technology revolution.

Government Surveillance of Civilians It would be fun to read Orwell’s Big Brother only in a novel but not in the reality. However, there seem to be many instances of surveillance of civilian activities by different institutions including government. The Watergate Scandal occurred in the 1970s where the scandal eventually led to the resignation of Richard Nixon due to illicit surveillance, an attempted cover-up, and destruction of evidence. Among numerous similar examples, there is also a case called “South Korea Watergate.”

In 2008 of two private citizens; a businessman who had posted a video clip ridiculing Mr. Lee, and wife of a legislator from the government party were monitored by an ethics team from the prime minister’s office. In 2010, seven of the team’s members of an ethics team were convicted of having conducted illegal surveillance and of destroying computer files before prosecutors searched their office. The team was originally launched to investigate corruption among civil servants but it monitored public officials and civilians who directly or indirectly opposed the government. For instance, it kept records of a senior government official’s extramarital affair, even specifying the facial expressions of the man and the woman.

Though the U.S. and Korea Watergate scandals share similar notions that both attempted illicit surveillance and destruction of evidence, a businessman who did not have enough power to protect himself from the authorities turns out to be the most severely victimized person in the cases. He simply posted in his blog video clip published by others that lampooned President Lee as a rat in a fashion from the movie, Sicko originally produced by Michael Moore. Later, it was revealed that an ethic team threatened his boss to fire him and then it he was forced to resign his position at his work. He also had lost his means to support his family and accumulated debt. Until now, he had not been able to find out why he was singled out as a target.

Another incident occurred in South Korea was about a 30 year old unemployed male blogger was convicted of posting incorrect information online that he faced trial for pessimistic financial forecasts in 2009. Under the pseudonym Minerva, he was largely known for his accurate forecasts of sharp falls in Korea’s won currency, the national stock market, and the demise of US investment bank Lehman Brothers. Though he was found not guilty and released from prison after three months, he was emotionally scarred.

Call for public awareness to better protect one’s privacy Just like the U.S. Constitution, the Constitution of the Republic of Korea specifies people’s freedom of expression, right to be protected against unreasonable searches and seizures. Further, the cases are far different from Olmstead v. United States (1928) where the Supreme Court ruled 5-4 against the plaintiff and in favor of the government, holding that wire-tapping was not an unreasonable search and seizure within the meaning of the Fourth Amendment because of a conspiracy to violate the National Prohibition Act.

Even though these two civilians had not violated any law rather than posting a video clip and forecasting financial crisis, they had no choice but to face extremely harsh consequences. The fourth amendment protection and the right of privacy that the Constitution guarantees are barely seen in the cases. The government just played a role nothing more than the big brother in 1984. The authorities abused their power but were not fully responsible for what they had done.

It is neither about the technology that is evolving a minute by minute nor is it about the law that speaks for the power. It is about us. It is the public that should be aware of the rights it has to protect and fight for. As technology, the law, and the power may possibly have one voice at some point, we have to constantly promote public awareness into the importance of our rights of privacy in such a complicated environment. Lastly, Socrates’s famous phrase, “a law is law, however undesirable it may be,” is not what you are going to say when our privacy right is violated as it can happen to anyone.

Navigation

Webs Webs

r1 - 04 Mar 2013 - 21:31:31 - SehwanJang
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM