{"id":186375,"date":"2017-04-05T16:30:47","date_gmt":"2017-04-05T20:30:47","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cia-nsa-arent-the-only-federal-agencies-violating-privacy-american-spectator\/"},"modified":"2017-04-05T16:30:47","modified_gmt":"2017-04-05T20:30:47","slug":"cia-nsa-arent-the-only-federal-agencies-violating-privacy-american-spectator","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/cia-nsa-arent-the-only-federal-agencies-violating-privacy-american-spectator\/","title":{"rendered":"CIA, NSA Aren&#8217;t the Only Federal Agencies Violating Privacy &#8211; American Spectator"},"content":{"rendered":"<p><p>    Wikileaks     recent dump of classified information related to the CIAs    secret hacking operations has once again sparked a conversation    about privacy in the digital age. While similar secret    surveillance programs like the NSAs PRISM have been in the    public eye for years, other government agencies    thatmishandle millions of Americans private information    in the light of day are often left unchecked.  <\/p>\n<p>    Take the U.S. Census Bureau, for example. Since 2005, Census    has selected approximately     three million Americans annually to complete the American    Community Survey (ACS), collecting information on the nations    demographic,    social, economic, and housing characteristics. While    theres no question that the ACS collects some valuable    information, the intrusive nature of the survey and the poor    security measures with which Census handles respondents    personal information should be a cause for concern no less    sothan any surveillance by the CIA or NSA.  <\/p>\n<p>    The methods used by Census Bureau employees can vary in the    degree to which they violate a persons privacy. Some may only    receive letters in the mail, appealing to the persons sense of    community, with a veiled threat if they do not comply. Others    have received a personal visit from a Census employee, often    resulting in pressure or downright intimidation to complete the    survey.  <\/p>\n<p>    Take Kimberly Hayes of Sapulpa, Oklahoma. After being    threatened with a fine by mail for     refusing to fill out the form because some of the    questions made her uncomfortable, a man sent by Census visited    her home unannounced in the hopes of getting her to complete    the ACS. The man started walking around and was looking in    windows, according to Hayes.  <\/p>\n<p>    If this gentleman had been trying to conduct a survey on behalf    of a companys marketing department, Hayes could have told him    to get lost without fear of repercussions. She might even have    been able to prosecute him for trespassing. So long as the ACS    exists, however, the letter of the law is against people like    Hayes. If our government treated its citizens with the respect    that companies reserve for their customers, violations of    privacy would be far less frequent.  <\/p>\n<p>    Unfortunately, our government is more often a technological        laggard than a pathbreaker. Census has been remarkably slow    in following the private sectors civilizing example.    Recipients who fail to fill out the online ACS are sent a paper    copy that they are asked to return in the mail, chock-full of    personal information that could be damaging in the wrong hands.    Questions range from the embarrassing (e.g.     Question 18b, Does this person have difficulty dressing or    bathing?) to the dangerous (e.g.     Question 33, What time did this person usually leave home    to go to work last week?).  <\/p>\n<p>    Furthermore, the Census database is vulnerable. It has already    been hacked into as recently as     2015. While Census tried to reassure nervous Americans that    survey information remains safe, secure and on an     internal network, bureaucrats dont always follow internal    safety protocols. In 2011, the State Department operated an    internal network that broke    federal standards and may have left     sensitive material vulnerable to hackers     according to the Associated Press.  <\/p>\n<p>    Many ACS answers are already compromised by design. On the    Bureaus microdata website, anyone can download data of    anonymous individualized    ACS responses for areas with as few as 600    people. The only defense against those who might use ACS    data for nefarious purposes is the bolded command: Use it for    GOOD  never for EVIL.  <\/p>\n<p>    There are better ways to acquire sensitive information while    protecting the privacy of citizens. For instance, in Europe,    there are many viable census models already in place that    drastically reduce privacy violations, and are more cost    effective to boot.  <\/p>\n<p>    The     Netherlands, Slovenia, and Austria are among eight European    countries that obtain census data without employing costly    survey employees to harass their constituents. These countries    use models that only process data from what other government    agencies have already collected, so there is no added risk of    privacy violations from mandatory and redundant surveys. The    monetary and psychological costs of harassment suggest that we    should look for foreign alternatives, perhaps even outside any    government solution.  <\/p>\n<p>    If the destruction of the ACS does indeed leave a void in the    market for knowledge, then a private company could fill this    gap, while heeding a mandate to respect our privacy. The fact    of the matter is that our government has rarely    prioritized the right to privacy for American citizens,    regardless    of which party is in power.  <\/p>\n<p>    The benefits of the ACS have been greatly exaggerated,    especially when we consider viable alternatives. The monetary    costs of the ACS,     while excessive at over $1.3 billion per year, are nothing    compared to the psychological damage done to three million    Americans annually. Our right to privacy has been offered up by    our government on the altar of the common good. Americans who    love their liberty should support replacing the ACS with a more    conscientious alternative.  <\/p>\n<p>  Census collection c. 1940 (Wikimedia Commons)<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/spectator.org\/cia-nsa-arent-the-only-federal-agencies-violating-privacy\/\" title=\"CIA, NSA Aren't the Only Federal Agencies Violating Privacy - American Spectator\">CIA, NSA Aren't the Only Federal Agencies Violating Privacy - American Spectator<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Wikileaks recent dump of classified information related to the CIAs secret hacking operations has once again sparked a conversation about privacy in the digital age. While similar secret surveillance programs like the NSAs PRISM have been in the public eye for years, other government agencies thatmishandle millions of Americans private information in the light of day are often left unchecked.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/cia-nsa-arent-the-only-federal-agencies-violating-privacy-american-spectator\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-186375","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/186375"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=186375"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/186375\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=186375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=186375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=186375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}