Big Data, Little Privacy: Tracking the Usual Suspects
In his article, Ken Strutin examines how the 21st century use of watch lists might or might not resemble the labeling of the McCarthy period, and how the experience of that era might inform an evaluation of present-day designation of the dangerous. After first describing the two labeling mechanisms, it compares them along several axes, finding that watch listing has both repeated some 1950s failings and moved on to develop some new ones of its own. In particular, because they are compiled and used in an opaque and completely one-sided process, watch lists run a substantial risk of incorrectly including many people who pose no threat.
The post Big Data, Little Privacy: Tracking the Usual Suspects appeared first on beSpacific.