 {"id":2139,"date":"2016-11-07T23:17:21","date_gmt":"2016-11-07T23:17:21","guid":{"rendered":"https:\/\/live-journal-of-law-and-public-policy.pantheonsite.io\/?p=2139"},"modified":"2016-11-07T23:17:21","modified_gmt":"2016-11-07T23:17:21","slug":"mass-government-surveillance-the-price-of-a-secure-nation","status":"publish","type":"post","link":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/2016\/11\/07\/mass-government-surveillance-the-price-of-a-secure-nation\/","title":{"rendered":"Mass Government Surveillance: The Price of a Secure Nation?"},"content":{"rendered":"By: Danny Ho\n\nMass government surveillance is a unique issue of concern in our increasingly technological era. <a href=\"https:\/\/www.aclu.org\/issues\/national-security\/privacy-and-surveillance\/nsa-surveillance\">Mass surveillance<\/a> refers to the government\u2019s indiscriminate monitoring of a large group of people through collection of large sets of data such as telephone records, emails, and internet activity. This issue gained public attention in 2013 when <a href=\"http:\/\/www.bbc.com\/news\/world-us-canada-22837100\">Edward Snowden<\/a>, a former CIA (<a href=\"https:\/\/www.cia.gov\/index.html\">Central Intelligence Agency<\/a>) employee and NSA (<a href=\"https:\/\/www.nsa.gov\/\">National Security Agency<\/a>) contractor, leaked confidential information about the NSA\u2019s global surveillance programs. The <a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order\">Snowden disclosures<\/a> revealed alarming evidence of government intrusion into the private lives of individuals. Among the revelations was the clandestine government program (code-named <a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\">PRISM<\/a>) that allowed the NSA to gain direct access to individual Google and Yahoo accounts with court approval.\n\n<a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2014\/06\/05\/a-year-after-snowden-revelations-government-surveillance-reform-still-a-work-in-progress\/\">The 2013 Snowden disclosures<\/a> forced our government to engage with privacy advocates and the public at large with regards to the implications of its surveillance policies. However, a string of recent global and domestic terrorist attacks \u2013 from <a href=\"http:\/\/www.latimes.com\/local\/lanow\/la-me-ln-san-bernardino-shooting-live-updates-htmlstory.html\">San Bernardino<\/a> to <a href=\"http:\/\/www.bbc.com\/news\/world-europe-34818994\">Paris<\/a> \u2013 <a href=\"http:\/\/www.cnn.com\/2015\/11\/20\/politics\/paris-syria-isis-surveillance-intelligence-politics\/\">renewed the push<\/a> for government surveillance programs to respond to fears that terrorists will otherwise avoid government detection. Knowledge of past invasive government surveillance programs and national security fears from recent terrorist attacks have created a <a href=\"http:\/\/www.pewresearch.org\/fact-tank\/2016\/09\/21\/the-state-of-privacy-in-america\/\">complex public debate<\/a>. Here, the tension between the need for surveillance programs and the infringement of individual privacy rights provides a salient issue of dispute.\n\nThe strongest argument in favor of mass surveillance is simple: the government needs to collect data in order to intercept terrorists before they are able to act. In the recent case between the <a href=\"http:\/\/www.nytimes.com\/interactive\/2016\/03\/03\/technology\/apple-iphone-fbi-fight-explained.html?rref=collection%2Fnewseventcollection%2Fapple-fbi-case&amp;action=click&amp;contentCollection=technology&amp;region=stream&amp;module=stream_unit&amp;version=latest&amp;contentPlacement=10&amp;pgtype=collection\">FBI and Apple<\/a> Inc., the government requested access to an iPhone used by one of the shooters in from the <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/us-wants-apple-to-help-unlock-iphone-used-by-san-bernardino-shooter\/2016\/02\/16\/69b903ee-d4d9-11e5-9823-02b905009f99_story.html\">San Bernardino shooting<\/a> in late 2015. This information could be useful in identifying terrorist connections, determining how the shooters carried out the attack, and gaining insight into possible future attacks. The court never issued a final ruling on the case because the FBI was able to <a href=\"http:\/\/www.latimes.com\/local\/lanow\/la-me-ln-fbi-drops-fight-to-force-apple-to-unlock-san-bernardino-terrorist-iphone-20160328-story.html\">hack the phone<\/a> of the San Bernardino shooter without Apple\u2019s assistance. The FBI dropped the law suit shortly thereafter. In today\u2019s age, where technology permeates life and digital communication is effortless, it is easy to see how someone would carry out a terrorist attack using common communicative technologies and how intercepting those data bits could thwart the same attack.\n\nThe main cost of mass surveillance, however, is individual privacy. Although not explicitly written into the Constitution, the Supreme Court recognized a Constitutional right to privacy in 1965 in the landmark case of <a href=\"http:\/\/www.pbs.org\/wnet\/supremecourt\/rights\/landmark_griswold.html\">Griswold v. Connecticut<\/a>. An individual\u2019s right to privacy is <a href=\"http:\/\/gilc.org\/privacy\/survey\/intro.html\">multi-faceted<\/a>, including informational privacy, bodily privacy, privacy of communication and territorial privacy.\n\nAs President Obama stated, however, \u201c<a href=\"https:\/\/www.rt.com\/usa\/obama-surveillance-nsa-monitoring-385\/\">you can\u2019t have 100% security and also then have 100% privacy and zero inconvenience<\/a>.\u201d With that in mind, what <em>is<\/em> the correct balance between the individual right to privacy and national security concerns? Is it appropriate that the government can collect a large quantity by merely arguing it serves the purpose of national security? Is it even <em>necessary<\/em> to collect vast oceans of personal data in this endeavor?\n\nSome would emphatically disagree by pointing to the <a href=\"https:\/\/www.propublica.org\/article\/whats-the-evidence-mass-surveillance-works-not-much\">apparent ineffectiveness<\/a> of these surveillance programs in the past few years. The White House review panel on the NSA\u2019s surveillance program determined that mass surveillance programs have not prevented any major terrorist attacks and that its methods were <a href=\"http:\/\/www.nbcnews.com\/news\/other\/nsa-program-stopped-no-terror-attacks-says-white-house-panel-f2D11783588\">not essential<\/a> to national security. In fact, information is <a href=\"http:\/\/www.washingtonsblog.com\/2015\/05\/nsa-admits-it-collects-too-much-info-to-stop-terror-attacks.html\">useless in excess<\/a> because experts have no way of deciphering what is truly relevant. The task would be similar to trying to find the proverbial needle in a haystack. If mass surveillance results in no real benefits for national security, why are we sacrificing our individual liberties?\n\nIndeed, surveillance programs can be adversely utilized for purposes beyond national security concerns. For example, in 2014, the CIA <a href=\"http:\/\/www.nytimes.com\/2014\/08\/01\/world\/senate-intelligence-commitee-cia-interrogation-report.html\">hacked<\/a> into Senate computers due to a negative report about CIA\u2019s interrogation practices. The Director of the CIA, John Brennan, <a href=\"http:\/\/www.nbcnews.com\/storyline\/cia-senate-snooping\/cia-director-denies-spying-senate-intel-committee-n49916\">denied the accusation<\/a>, but evidence showed that Brennan contemplated issuing an <a href=\"http:\/\/www.theatlantic.com\/politics\/archive\/2015\/08\/john-brennans-unsent-letter-i-apologize-for-the-actions-of-cia-officers\/401174\/\">official apology<\/a> after the discovery of CIA misconduct. This incident suggests just <em>one<\/em> apparent risk posed by our government\u2019s actions.\n\nFurthermore, if the government uses data from mass surveillance programs for anything other than preventing real threats to our security, we are giving up our right to privacy for something less than absolute necessity. Current views on U.S. surveillance programs reflect this concern. In fact, a survey done by the <a href=\"http:\/\/www.pewresearch.org\/\">Pew Research Center<\/a>, a nonpartisan group based in Washington, D.C., revealed that <a href=\"http:\/\/www.pewinternet.org\/2015\/03\/16\/americans-views-on-government-surveillance-programs\/\">more than 50%<\/a> of Americans are at least somewhat concerned about the intrusive nature of U.S. surveillance practices. Additionally, <a href=\"http:\/\/www.pewinternet.org\/2015\/03\/16\/americans-views-on-government-surveillance-programs\/\">a majority<\/a> of the surveyed Americans said that they were less than confident that the government was using the surveillance programs for national security purposes.\n\nGiven that the public is already skeptical about mass surveillance, the programs we already have in place should at least try to minimize unnecessary intrusions and ensure that national security interests are the sole purpose of the programs. Whatever the solution to the successful prevention of major terrorist attacks may be, current surveillance practices seem overly intrusive and raise more controversy than benefit.","protected":false},"excerpt":{"rendered":"<p>By: Danny Ho Mass government surveillance is a unique issue of concern in our increasingly technological era. Mass surveillance refers to the government\u2019s indiscriminate monitoring of a large group of people through collection of large sets of data such as telephone records, emails, and internet activity. This issue gained public attention in 2013 when Edward&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2140,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14,15,16,18,19,27],"tags":[307,535,625,736,739,884,1002,1072,1265,1322,1399,1476],"class_list":["post-2139","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-archives","category-authors","category-blog-news","category-feature","category-feature-img","category-recent-stories","tag-cia","tag-edward-snowden","tag-fbi","tag-government-intrusion","tag-government-surveillance","tag-john-brennan","tag-mass-surveillance","tag-national-security","tag-public-privacy","tag-right-to-privacy","tag-snowden","tag-surveillance"],"acf":[],"_links":{"self":[{"href":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/wp-json\/wp\/v2\/posts\/2139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/wp-json\/wp\/v2\/comments?post=2139"}],"version-history":[{"count":0,"href":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/wp-json\/wp\/v2\/posts\/2139\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/wp-json\/wp\/v2\/media\/2140"}],"wp:attachment":[{"href":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/wp-json\/wp\/v2\/media?parent=2139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/wp-json\/wp\/v2\/categories?post=2139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/jlpp\/wp-json\/wp\/v2\/tags?post=2139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}