Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Ethical Decision Making - Situation 5
Transcript of Ethical Decision Making - Situation 5
João Oliveira nº9073
Inês Relvas nº8944 1. The situation 2. Is Matrix ethical ? 3. PAPA Begin: July 2003 In response to September 11th, 2001 Administered:
Institute for Intergovernmental Research (IIR)
Department of Homeland Security (DHS)
Multi-State Anti-Terrorism Information Exchange What is ? Collaborative information:
sharing effort involving public, private, and non-profit entities.
State-controlled information program
state-owned or publicly available records Law enforcement investigators: accessed it support specific investigations Law enforcement investigators accessed it to support specific investigations
an active criminal investigation
or to prevent a criminal act based on investigative information
- failed to consider and adopt comprehensive privacy protections:
these programs were engaging in “mission creep” or in unrestricted “data mining”
- mass scrutiny of the lives and activities of innocent people
- predominantly used to investigate fraud, robbery, and other crimes,
- lacked adequate audit controls
Alteration of the structure of the project
Continued use of its website
Draft audit procedures and a standard audit form to establish a minimum standard among the states
Invitation of noted privacy experts to review the project
nformation in the Matrix - Credit information
- Driver’s license photographs
- Marriage and divorce records
- Past addresses and telephone numbers
- Names and addresses of family members
- Neighbors’ addresses and telephone numbers
- Business associates
- The make, model and color of registered vehicles
- Speeding tickets
- Social security numbers and dates of birth
in Atlanta Journal-Constitution reports vs. - Pilot licenses issued by the Federal Aviation Administration;
- Aircraft ownership;
- Property ownership;
- U.S. Coast Guard-registered vessels;
- State sexual offender lists;
- Corporate filings;
- Uniform Commercial Code filings or business liens;
- Bankruptcy filings;
- State-issued professional licenses. criminal history records;
- Department of corrections information and photo images;
- Sexual offender criminal history files;
- Driver’s license information and photo images;
- Motor vehicle registration information
in CRS Report for Congress
Revision not enough
15th April 2005
- no more networking among states
(Seisint search application)
It can be an efficient tool for the war on terror
Can also be used to aid ordinary criminal investigations
Accessed by a private corporation
Not controlled by a reliable entity
Not subjected to privacy laws
May have contained illegal data
It posed a threat to the rights of the individual and to the foundations of Democracy.
Base question The trade-off vs. Freedom Security Pattern of values admitted for this analysis The defense of Freedom and Democracy has priority over Life and Security. “That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to affect their Safety and Happiness. (...) But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.”
Declaration of Independence, 1776 "Those who would give up Essential Liberty to purchase a little Temporary Safety, deserve neither Liberty nor Safety."
Benjamin Franklin of the Matrix It has been proven by History that the greatest threat to a nation state’s security is internal and not external. Connection to the Matrix This information could have been used:
to prosecute opposition inside the country
damage credibility of political opponents by divulging private information
purge minorities or undermine activities considered criminal by the Government and not the state
imprisonment of innocent individuals
bypassing the courts by accessing private information without due process
Current example of a bad trade-off Creation of the legal figure “enemy combatant”, which is used to put prisoners of war outside of the Geneva Convention, signed by the U.S., and, therefore, to permit torture and other practices which are opposed to the Ideals of the Western Society
Free-speech Zones Privacy What information to reveal?
Can information be used for other purposes than those informed?
Matrix has information we believe should not be disclosed.
It gives law enforcement too much access to private details on millions of people IRR reported that only 2,6% of the cases were related to terrorism. Accuracy Who’s responsible for the reliability and accuracy of information?
Who will be accountable for errors?
Contract between Matrix and Seisint states that it cannot guarantee the "correctness or completeness" of data in the system.
States that utilize the system are responsible for "assuring that any information relied upon is accurate, current, valid, and complete." However, Matrix "Success Stories" consistently describes law enforcement taking action based solely upon the information contained in Matrix. Property Who owns information? Government and commercial databases combined by Seisint and stored in the company's computers.
Accessibility Who can access the information in Matrix? Law enforcement organizations
and a small number of Seisint employees Thank you for your attention! Agenda
1. The situation
2. Is Matrix ethical?
3. PAPA Germany in the XIX and XX centuries
Witch hunt and prisoner camps in the U.S.