Privacy vs National Security

International Journal of Computer Trends and Technology (IJCTT)          
© 2020 by IJCTT Journal
Volume-68 Issue-7
Year of Publication : 2020
Authors : Tajdar Jawaid


MLA Style: Tajdar Jawaid  "Privacy vs National Security" International Journal of Computer Trends and Technology 68.7 (2020):1-7.

APA Style Tajdar Jawaid. Privacy vs National Security.  International Journal of Computer Trends and Technology, 68(7),1-7.

There are growing concerns and anxiety about privacy among general public specially after the revelations of former NSA contractor and whistleblowers like Edward Snowden and others. While privacy is the fundamental concept of being human, the growing tug-of-war between individual’s privacy and freedom vs national security has renewed the concerns of where the fine balance should lie between the two. For the first time in history the technological advancement has made the mass data gathering, analysis and storage a financially and technologically feasible option for the governments and private businesses. This has led to the growing interest of governments and security agencies around the globe to develop sophisticated algorithms using the power of Big-Data, Machine-Learning and Artificial Intelligence. The technology has enabled governments and private businesses to collect and store thousands of data points on every individual, which has put individual’s privacy under constant threat. This article analyses the individual's privacy concepts and its perceived link with national security. The article will also discuss the various aspects of privacy and national-security, arguments of both sides and where a boundary should be drawn between privacy and national-security.

[1] (1948) The United Nations website, "Universal Declaration of Human Rights (UDHR)", [Online]. Available: rights/
[2] (1966) The United Nations website. United Nations Treaties. "International Covenant on Civil and Political Rights (ICCPR)". [Online]. Available: volume-999-i-14668-english.pdf
[3] The Privacy Insertional website. [Online]. Available:
[4] (1995). The European Union website. Europa, Access to European Union Law. "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data". Official Journal of European Union L 281, 23/11/1995 P.0031 - 0050. [Online]. Available: https://eurlex. EN/TXT/?uri=celex%3A31995L0046
[5] (2016). The European Union website. Europa, Access to European Union Law. "REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL, General Data Protection Regulation". Official Journal of European Union L 119/1, 27/04/2016. [Online]. Available: EN/TXT/?uri=uriserv%3AOJ.L_.2016.119.01.000 1.01.ENG&toc=OJ%3AL%3A2016%3A119%3ATOC
[6] The U.S. Congress website. Constitution Annotated, Analysis and Interpretation of the U.S. Constitution, “Fourth Amendment”. [Online]. Available: 4/
[7] George Orwell, “Nineteen Eigthy-Four”, Penguin Modern Classics, 2004.
[8] The U.S. Department of Justice website. The USA Patriot Act: Preserving Life and Liberty. [Online]. Available:
[9] (2015). The United Kingdom Home Office website. Investigatory Powers Act. Published 1st March 2015. Home Office, United Kingdom. [Online]. Available: bill
[10] Luke Harding, “The Snowden Files”, Penguin Random House. 2014.
[11] (2009). Electronic Frontier Foundation. “Google CEO Eric Schmidt Dismisses the Importance of Privacy”. [Online]. Available: eric-schmidt-dismisses-privacy
[12] Daniel J. Solove, “Nothing to Hide”. Yale University Press (2011).
[13] (2014). Electronic Frontier Foundation, (2014). NSA Spying. [Online]. Available at:
[14] (2020). University of Maryland. Global Terrorism Database. Incidents over time. [Online]. Available at:
[15] (2011). PEW Research Center. Civil liberties and antiterrorism policies. [Online]. Available at: 2016/02/19/americans-feel-the-tensions-betweenprivacy- and-security-concerns/
[16] (2018). Dr. Lorenzo Vidino, George Washington University. [Online]. Available at:
[17] (2015). Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael Specter, and Daniel J. Weitzner .“Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”. Computer Science and Artificial Intelligence Laboratory Technical Report. [Online]. Available at: TR-2015-026.pdf
[18] (2018). Carole Cadawalladr, Emma Graham-Harrison. “Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach”. The Guardian. [Online]. Available at: uploads/2018/04/50-million-fb-profiles-harvestedby- cambridge-analitica.pdf
[19] (2013). David Wright, Reinhard Kreissl. “European responses to the Snowden revelations: A discussion paper”. Increasing Resilience in Surveillance Societies (IRISS). [Online]. Available at: ISS_European-responses-to-the-Snowden-revelations_18- Dec-2013_Final.pdf

Privacy, Human Right, National Security, Terrorism, Counterterrorism, Profiling, Cataloguing, Personal Data, Mass-Surveillance, Cybersecurity, Big-brother, Machine-Learning, Big- Data, AI, FISA.