• Skip to main content
  • Skip to primary sidebar
  • Home
  • Categories
  • Authors
  • Print Versions
  • About
  • Masthead
    • 2022-2023
    • 2016-2017

The Bowdoin Review

How Do We Find a Middle Ground in Online Transparency?

Written by: Andrew Jorge '25
Published on: February 7, 2024

Art by Alfonso Garcia

Curiosity is human instinct. It is in our nature to be curious about what our friends and family are doing, who the person next to you in the library is texting long paragraphs to, what the people in your class are whispering about, and what grades they got on their last midterm. Of course, these are instances where it wouldn’t hurt to mind your business. But what if you end up overhearing a crime in the making? If being inquisitive can protect us from harm, then when does it truly become ‘none of our business’? 

Shifting our focus from individual curiosity to national security, we encounter similar dilemmas on a much larger scale. In the United States, we’ve seen security measures diminish the privacy of those who choose to fly by air. While being a somewhat minimal encroachment, it portrays a reestablishment of values; we can attribute this to the 9/11 terrorist attacks, which is an unfortunate case of a lack of security; al-Qaeda used a cryptic communication system while the U.S. intelligence held fragmented data which if shared effectively across agencies, might have preempted the tragedy. This dilemma is a reality that lawmakers must often face. When it comes to granting the public a reasonable amount of privacy, they must act according to an appropriate level of authority. Implementing a strongly encrypted online atmosphere, particularly through encryption, ensures that personal data is securely shielded from unauthorized external access. Not only does this establish a clear boundary between government and public privacy, but it has the added benefit of significantly protecting against cyber attackers. 

Reflecting the trend towards prioritizing user privacy in the digital realm, Meta has established end-to-end encryption (E2EE) on most of their platforms this year. This form of encryption guarantees that the message’s contents can only be accessed by the sender and the intended recipient. This means that neither the messaging service provider nor anyone else, even a government official, can view the message’s content while it’s in transit or at rest. Meta intends to continue implementing E2EE on all of its platforms, marking a significant step in the direction of user privacy. However, this raises concerns about the potential drawbacks of excessive privacy, such as hindering legitimate law enforcement efforts and possibly shielding nefarious acts from necessary investigation.

Many argue in favor of the implementation of E2EE as a way to secure their online data from malicious hackers. An instance that has grounds for fueling this desire would be when Facebook faced a huge security breach in September 2018. Nearly 50 million users had their confidential information exposed to attackers that exploited several bugs in Facebook’s code. “The flaw allowed the attackers to steal so-called access tokens — digital keys that allow access to an [Facebook] account,” according to a New York Times article. The identity and intentions of these attackers have remained a mystery. In addition to this massive data leak, there have been seven other data breaches on Facebook alone, raising the question of what privacy could look like with widespread E2EE and similar initiatives. While stronger shields of privacy can protect users from cybercriminals, they could also obstruct investigations on said criminals, even more so challenging the balance between privacy and security.

These recent initiatives on Meta’s platforms have come after a political battle in the United Kingdom. A few years ago, then-Home Secretary Priti Patel pushed for Meta to provide law enforcement and other government officials access to encrypted messages sent on its platforms, arguing that this was necessary for identifying criminals and potential crime. She explains in an article with The Daily Telegraph, “A great many child predators use social media platforms such as Facebook to discover, target, and sexually abuse children. These protections need to be in place before end-to-end encryption is rolled out around the world.” 

I’d also like to acknowledge legitimate arguments to be made about maximizing user privacy. Two years prior to the Facebook breach, there was a dispute between Apple and the FBI over the company’s use of encryption. Following the San Bernardino terrorist attack, the FBI asked Apple to create a software tool to unlock an iPhone 5C used by one of the shooters. Apple resisted, asserting that such a tool could compromise the security of all iPhones, thus threatening user privacy. While the FBI viewed their request as a matter of national security, Apple saw it as a potential privacy invasion with broad implications. Ultimately, the FBI withdrew its request after accessing the iPhone data without Apple’s assistance. From my perspective, the standoff between Apple and the FBI highlights a complex intersection of privacy, security, and ethical considerations in the digital age. While there is an obvious need for national security, there is still a potential for privacy invasion that cannot be overlooked.

Apple CEO Tim Cook embodies this perspective in a public letter following the request, describing the government’s demands as something “chilling”. He described how, if the government permitted itself to unlock your iPhone, it would be capable of much more than just that. “The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge,” he stated.

Having said that, while Apple advocates for security against government intrusion, their own data collection practices contradict this sentiment, highlighting a broader inconsistency in the tech industry’s approach to privacy. From my perspective, this reflects a form of hypocrisy. Excessive privacy from government oversight, as some tech companies promote, can be problematic. It risks shifting power over personal data from elected authorities to corporations, challenging accountability and authority.

In considering the balance between privacy and security, it’s helpful to conceptualize it through the lens of societal obligations. Just as a child grows up under the guidance of a parent, learning to navigate the balance between free expression and responsible behavior, so does a citizen in a society. Because every child is inherently dependent on their parents, that parent is responsible for attempting to shape their child into a functioning member of society. Many hierarchical relationships can be described through this paradigm, where some degree of compliance is required to reap the benefits of an authority.

Such an affinity between ranks of power is foundational to human connection on a personal scale and among a group of individuals. Government depends on a reciprocal relationship between the governed and the governing bodies.  When we consider online surveillance in this context, it becomes a question of societal responsibility. If the public accepts security measures in physical spaces, like airports, for the common good, then why not have a similar approach to online spaces? The use of social media among younger users presents a case where monitored interactions could serve a protective purpose. However, this should not champion unchecked surveillance. Just as a search warrant is required for physical searches, online monitoring should be governed by strict guidelines to prevent abuse.

In essence, my argument is not for an elaborate spying system, but for a balanced approach where the government’s actions are transparent and accountable. As we navigate this issue intricately, it becomes clear that a balanced approach is essential, where we must lean toward confiding in the system that keeps our rights secure. Surveillance, whether online or offline, should be a carefully considered tool, used only when necessary and under strict regulations. It’s about maintaining a relationship with the government that is responsible and effective, ensuring that both our security and our rights are upheld.

Categories: TechnologyTags: Privacy

Primary Sidebar

Recent Posts

  • Why South Africa Remains Unequal Thirty Years After Apartheid May 7, 2024
  • Skeptical of September February 8, 2024
  • Waterwheel February 7, 2024
  • Nineteen February 7, 2024
  • D.C.’s Most Expensive Retirement Home: Congress    February 7, 2024
  • Instagram

Archives

  • May 2024
  • February 2024
  • October 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • May 2022
  • April 2022
  • February 2022
  • December 2021
  • November 2021
  • April 2021
  • March 2021
  • February 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • April 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • August 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • December 2016
  • November 2016
  • October 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • May 2015
  • April 2015
  • December 2014
  • October 2014
  • April 2014
  • March 2014
  • December 2013
  • November 2013
  • February 2012

Copyright © 2025 · The Bowdoin Review - A voice on campus for politics, society, and culture.