The Ethics of Mass Surveillance in the Digital Era by Cole Barrow

download The Ethics of Mass Surveillance in the Digital Era by Cole Barrow

of 10

description

The Ethics of Mass Surveillance in the Digital Era by Cole Barrow

Transcript of The Ethics of Mass Surveillance in the Digital Era by Cole Barrow

  • In June of 2013, former NSA contractor Edward

    Joseph Snowden obtained classified documents that

    revealed a secret government surveillance program being

    carried out by the National Security Agency. Through

    these disclosures, we have come to learn that the NSA is

    routinely collecting and storing the phone and internet

    records of millions of American citizens on a daily basis.

    The initial story reported by Glenn Greenwald of The

    Guardian showed us that a top secret court order issued

    in April of 2013 requires Verizon on an ongoing, daily

    basis to give the NSA information on all telephone calls

    in its systems, both within the U.S. and between the

    U.S. and other countries (Greenwald, 2013). The result

    of this and further revelations has elicited widespread

    debate between proponents and critics of this system

    on both ends of the political spectrum; civil liberties

    advocates expressed their outrage over the blatant attacks

    on their right to privacy, while proponents of this system

    have expressed their opinions as to how a program like

    this is a vital necessity to national security and protecting

    American interests abroad.

    However, this claim is often found to be

    unsubstantiated. A recent review published by the

    New America Foundation has shown that the NSAs

    domestic surveillance program plays a minimal role in

    the prevention of terrorist-related attacks. An in-depth

    analysis of 225 individuals recruited by al-Qaeda or a

    like-minded group or inspired by al-Qaedas ideology,

    and charged in the United States with an act of terrorism

    since 9/11, demonstrates that traditional investigative

    methods, such as the use of informants, tips from local

    communities, and targeted intelligence operations,

    The Ethics of Mass Surveillance in the Digital Eraby Cole Barrow

  • provided the initial impetus for investigations in the

    majority of cases, while the contribution of NSAs bulk

    surveillance programs to these cases was minimal. NSA

    surveillance under an unidentified authority played a

    role in 1.3 percent of the cases we examined (Bergen,

    Sterman, Schneider, & Cahall, 2014).

    Another common argument I often hear from

    those that sympathize with this program is: If I have

    nothing to hide, why should I be worried? Well, when

    we are kept in the dark about certain policies, we will

    never have the opportunity to have an open and honest

    discussion about the issues at hand. We therefore lose

    our ability to make important decisions as an informed

    publicand as a result, systematic government abuse

    goes unanswered. A much greater political thinker than

    myself, John F. Kennedy, expressed the importance and

    ever-present need for government transparency in his

    famous speech The President and the Press. He states,

    The very word secrecy is repugnant in a free and open

    society; and we are as a people inherently and historically

    opposed to secret societies, to secret oaths and to secret

    proceedings. We decided long ago that the dangers of

    excessive and unwarranted concealment of pertinent facts

    far outweighed the dangers which are cited to justify it

    (Kennedy, 1961). Throughout the following paragraphs,

    I will be discussing what we have come to know from

    the revelations thus far and attempt to illuminate some

    of the risks that an unrestricted dragnet surveillance

    apparatussuch as the one we have nowposes to us as

    a nation, and to our global society.

    The implementation of some of the NSAs most

    valuable data collection programs can be traced back

    The very word secrecy is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. John F. Kennedy, 1961.

  • to 2001, appearing in the immediate aftermath of

    the September 11th terrorist attacks. As the result of

    a secretive order signed by former president Bush on

    October 4, 2001, the NSAs domestic spying program

    officially comes into being. This initial data collection

    programgiven the code name Stellar Wind

    gave the NSA the ability to spy on the phone calls and

    e-mails of American citizens without first acquiring a

    warrant (The Guardian, 2009). This program later paved

    the way for others to be established in what is part of a

    collect it all maxim coined by former NSA chief Keith

    Alexander (Nakashima & Warrick, 2013). Soon after

    Stellar Wind was introduced, other similar programs

    were coalesced into what would result in the dragnet

    surveillance apparatus we have today: programs such

    as XKeyscore, which allows analysts to search with no

    prior authorization through vast databases containing

    e-mails, online chats and the browsing histories of

    millions of individuals (Nakashima & Horwitz,

    2013); MYSTIC, which enabled the NSA to record all

    conversations across [an] unidentified foreign country

    and store billions of them for 30 days (Daily Mail

    Reporter & Associated Press, 2014); and the NSAs most

    valuable asset: PRISM, which gives the agency direct

    access to the servers of Google, Facebook, Apple and

    other U.S. internet giants (Greenwald & MacAskill,

    2013). Soon after the PRISM story was published, these

    tech companies denied any previous knowledge of the

    PRISM program; which means either someor all

    of these companies were complicit in handing over user

    information to the NSA and were coerced into remaining

    silent on the matter, or this was carried out without the

    consent of these companies and without the knowledge

    of their users. This practicein clear violation of the

    fourth amendmentis being allowed to take place due

    in part to section 215 of the USA PATRIOT Act, which

    allows the government to require businesses to hand over

    records of any tangible things for an investigation to

    protect against international terrorism (USA PATRIOT

    Act, 215). The FISA court oversees this provision, which

    I will discuss in the next paragraph.

    Now that we are aware that these communications

    are in the hands of intelligence officials, through

    what process is the authority to target an individual

    established? Short answer: in secret, through a secret

    court. The FISA (Foreign Intelligence Surveillance Act)

  • court is a secret court which gives the authority for the

    NSA to target a specific individual for surveillance. The

    process itself is highly secretive and conducted with very

    little oversight. When it is time for the NSA to obtain

    FISA court approval, the agency does not tell the court

    whose calls and e-mails it intends to intercept. It instead

    merely provides the general guidelines which it claims are

    used by its analysts to determine which individuals they

    can target, and the FISA court judge then issues a simple

    order approving those guidelines (Greenwald, 2013).

    When the Foreign Intelligence Surveillance Act was

    originally enacted in 1973, its intention was to limit the

    authority given to government agencies that we now see

    being exercised today. Its primary purpose was to ensure

    that the U.S. government would be barred from ever

    monitoring the electronic communications of Americans

    without first obtaining an individualized warrant from the

    FISA court, which required evidence showing probable

    cause that the person to be surveilled was an agent of a

    foreign power or terrorist organization. As of 2008, the

    act was revised to state that no individualized warrants

    would be required to carry out this kind of surveillance

    (Greenwald, 2013). According to constitutional law, this

    is blatantly illegal; as it is in clear violation of the fourth

    amendment. To put things into even clearer perspective,

    weve just recently learned that even members of Congress

    are barred from accessing these FISA court orders (Fang,

    2015). This should raise a major red flag; as it leaves room

    for little to no congressional oversight whatsoever. It is

    a practical impossibility for members of the House of

    Representatives to do [an] effective job of oversight of the

    intelligence community given the current structure of

    the House and its rules (Eddington, 2015). What this in

    turn does, is it essentially erodes our checks and balances

    system that is so principal to our political process and

    allows for a disproportionate amount of power to be

    continually placed in a government institution engaging

    in unconstitutional practices.

    Now that weve established the legal justifications for

    these practices being allowed to continue unchecked, lets

    look at some of the ways in which the mass surveillance

    program is being abused by those in power. According

    to NSA documents leaked by Snowden, it was revealed

    that the United States had been actively monitoring

    Brazilian president Diana Rousseffs phone calls, as well

    as monitoring Brazilian embassies and spying on the

  • state oil corporation, Petrobras. Rousseff condemned the

    acts in a scathing speech given at the U.N. shortly after

    becoming aware of the eavesdropping. Personal data

    of citizens was intercepted indiscriminately. Corporate

    informationoften of high economic and even strategic

    valuewas at the center of espionage activity (Rousseff,

    2013). This was not an isolated incident; in another case

    of economic espionage, a leaked NSA PowerPoint slide

    showed U.S. involvement in monitoring the government

    and personal e-mails of the top 10 Venezuelan economic

    officials. A stated goal in this presentation was preventing

    Venezuela from achieving its regional leadership objectives

    and pursuing policies that negatively impact U.S. global

    interests. An NSA officer in Texas, in other words, was

    paid each day to peruse the private messages of obscure

    Venezuelan bureaucrats, hunting for tidbits that might

    offer some tiny policy edge (Shane, 2013). Of course, any

    unethical behavior of this scope must be almost invariably

    accompanied by self-vindicating rhetoric. Perhaps it

    should come as no surprise then that just as of March

    2015, president Obama formally declared Venezuela

    to be a national security threat (Mason & Rampton,

    2015). This unwarranted spying is not only restricted to

    South American officials, but to our European political

    allies as well, such as was the case with our eavesdropping

    on the phone conversations of German chancellor Angela

    Merkel (Pengelly, 2014). At this point, the ulterior

    motives guiding our foreign surveillance activities are

    clear. This reckless abuse of power undoubtedly subverts

    our status as a constitutional republic and transforms us

    into an omnipotent hegemonysubsequently operating

    as exempt from international law.

    Personal data of citizens was intercepted indiscriminately. Corporate informationoften of high economic and even strategic valuewas at the center of espionage activity (Rousseff, 2013).

  • Drawing from what we know about our surveillance

    powers being used in the past to monitor activists and

    social movements, we could infer that these powers are

    currently being used to monitor well-intentioned citizens

    domestically. It is well-documented that intelligence

    agencies in the United States, such as the FBI, have used

    their surveillance capabilities in the past to monitor

    political activists, peaceful social movements, and

    important political figures. Two such instances that come

    to mind are the FBIs monitoring of Dr. Martin Luther

    King, Jr. in the 1960s (Christensen, 2008), and the

    Watergate scandal in which former President Nixon was

    implicated in the phone-tapping of key political figures

    with the aid of the FBI, CIA, and the IRS (Perlstein,

    2015). One cause for concern is the wide-ranging technical

    capabilities of this program, and the ability for the NSA

    to effortlessly target those it deems as a threat in their

    own loose interpretation. According to a recent article

    published by The Intercept, recently obtained classified

    government documents show that Nearly half of the

    people on the U.S. governments widely shared database

    of terrorist suspects are not connected to any known

    terrorist group. Of the 680,000 people caught up in the

    governments Terrorist Screening Databasea watch list

    of known or suspected terrorists that is shared with local

    law enforcement agencies, private contractors, and foreign

    governmentsmore than 40 percent are described by

    the government as having no recognized terrorist group

    affiliation. That category280,000 peopledwarfs

    the number of watch-listed people suspected of ties to

    al-Qaeda, Hamas, and Hezbollah combined (Scahill &

    Devereaux, 2014). Imagine, if you will, a scenario in which

    political dissent is categorized by the U.S. government as

    a threat. This could then be used specifically to place

    innocent Americans on a government watch list; which

    will in turn allow agencies such as the NSA to monitor

    and discredit political activists, and even intimidate or

    silence investigative journalists that may be working on

    highly sensitive stories that implicate powerful figures.

    Given what we know already, my supposition is that this

    will beand possibly already isused domestically for

    this exact purpose.

    With geopolitical change and technological

    advancement accelerating at such a rapid pace, this kind

    of unrestricted surveillance apparatus can be left open

    to even greater abuse in the future; potentially serving

  • as a mechanism for complete social and political control.

    Zbigniew Brzezinskia former national security advisor

    and counsellor to presidents Lyndon Johnson, John F.

    Kennedy, and Jimmy Carterseems to agree that this is

    a very possible outcome. In Zbigniew Brzezinskis book

    Between Two Ages: Americas Role in the Technotronic

    Era, Brzezinski postulates a scenario where a dystopian

    future may be well in our midst; one where total social

    control is not only possible, but inevitable. In one

    particular passage he seems to be alluding to the exact

    kind of dragnet surveillance apparatus that we have now.

    Brzezinski states, The technotronic era involves the

    gradual appearance of a more controlled society. Such a

    society would be dominated by an elite, unrestrained by

    traditional values. Soon it will be possible to assert almost

    continuous surveillance over every citizen and maintain

    up-to-date complete files containing even the most

    personal information about the citizen. These files will

    be subject to instantaneous retrieval by the authorities

    (Brzezinski, 1970).

    It goes without saying that we need some system

    of surveillance in place to protect against foreign and

    domestic threats; the problem is in regards to the efficacy

    of some of these surveillance programs and what they are

    actually being used for. We must find a way to balance

    our need for security without sacrificing our individual

    liberties in return. Going up against such a powerful

    adversary may leave many opponents feeling despondent

    and powerless in what they can do on a macro level,

    but certain measures can be taken immediately to

    help safeguard your personal privacy, such as using

    encrypted communication services, and boycotting

    tech companies that remain complicit in these abuses;

    this, in itself, is a form of protest. As a result, this could

    potentially encourage companies to speak out and take

    action against warrantless surveillance. Thankfully, some

    companies and organizations have recently come forth

    to challenge the NSAs illegal data collection practices

    such as Wikipedia, and the ACLU (Ingram, 2015). By

    taking personal responsibility to ensure our right to

    privacy, together we can reclaim our constitutional rights

    and force meaningful change as we move forward in the

    digital era.

    words & design

    COLE BARROW

  • Greenwald, G. (2013, June 6). NSA collecting phone records of millions of Verizon customers daily.

    The Guardian. Retrieved from: http://www.theguardian.com/world/2013/jun/06/nsa-phone-

    records-verizon-court-order

    Bergen, P., Sterman, D., Schneider, E., & Cahall, B. (2014, January). Do NSAs bulk surveillance

    program stop terrorists? New America Foundation. Retrieved from: http://www.newamerica.net/

    sites/newamerica.net/files/policydocs/Bergen_NAF_NSA%20Surveillance_1_0_0.pdf

    Kennedy, J.F. (1961, April 27). The president and the press: Address before the American Newspaper

    Publishers Association, April 27, 1971. John F. Kennedy Presedential Library and Museum.

    Retrieved from: http://www.jfklibrary.org/Research/Research-Aids/JFK-Speeches/American-

    Newspaper-Publishers-Association_19610427.aspx

    Nakashima, E., & Warrick, J. (2013, July 14). For NSA chief, terrorist threat drives passion to collect

    it all. The Washington Post. Retrieved from: http://www.washingtonpost.com/world/national-

    security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-

    11e2-a301-ea5a8116d211_story.html

    Nakshima, E., & Horwitz, S. (2013, July 31). Newly declassified documents on phone records

    program released. The Washington Post. Retrieved from: http://www.washingtonpost.com/

    world/national-security/governments-secret-order-to-verizon-to-be-unveiled-at-senate-

    hearing/2013/07/31/233fdd3a-f9cf-11e2-a369-d1954abcb7e3_story.html

    References

  • Daily Mail Reporter, & Associated Press. (2014, March 18). NSA recorded every single phone call

    in one country as part of secretive MYSTIC program. Daily Mail. Retrieved from: http://www.

    dailymail.co.uk/news/article-2584011/NSA-recorded-single-call-one-country-secretive-MYSTIC-

    PROGRAM.html

    Greenwald, G., & MacAskill, E. (2013, June 7). NSA Prism program taps in to user data of Apple,

    Google and others. The Guardian. Retrieved from: http://www.theguardian.com/world/2013/

    jun/06/us-tech-giants-nsa-data

    USA PATRIOT Act, 215. Access to records and other items under the Foreign Intelligence

    Surveillance Act. Retrieved from: http://theoceancountylibrary.org/USPatriotActSection215.htm

    Greenwald, G. (2013, June 18). Fisa court oversight: a look inside a secret and empty process. The

    Guardian. Retrieved from: http://www.theguardian.com/commentisfree/2013/jun/19/fisa-court-

    oversight-process-secrecy

    Fang, L. (2015, April 3). In new video, congressman explains why his fellow lawmakers

    couldnt be trusted with NSA oversight. The Intercept. Retrieved from: https://firstlook.org/

    theintercept/2015/04/03/property-insurance-companies-flooded-dark-money-groups-tied-gop-

    cash/

    Borger, J. (2013, September 24). Brazilian president: US surveillance a breach of international law.

    The Guardian. Retrieved from: http://www.theguardian.com/world/2013/sep/24/brazil-president-

    un-speech-nsa-surveillance

  • Shane, S. (2013, November 2). No morsel too miniscule for all-consuming NSA. The New York

    Times. Retrieved from: http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-

    all-consuming-nsa.html

    Mason, J., & Rampton, R. (2015, March 9). U.S. declares Venezuela a national security threat,

    sanctions top officials. Reuters. Retrieved from: http://www.reuters.com/article/2015/03/09/us-

    usa-venezuela-idUSKBN0M51NS20150309

    Pengelly, M. (2014, March 29). NSA listed Merkel among leaders subject to surveillance report.

    The Guardian. Retrieved from: http://www.theguardian.com/world/2014/mar/29/nsa-merkel-

    leaders-surveillance-documents-snowden

    Christensen, J. (2008, December 29). FBI tracked Kings every move. CNN. Retrieved from: http://

    www.cnn.com/2008/US/03/31/mlk.fbi.conspiracy/

    Perlstein, R. (2015, February 18). Watergate scandal. Encyclopdia Britannica. Retrieved from:

    https://www.britannica.com/EBchecked/topic/637431/Watergate-scandal

    Scahill, J., & Devereaux, R. (2014, August 5). Barack Obamas secret terrorist-tracking system, by

    the numbers. The Intercept. Retrieved from: https://firstlook.org/theintercept/2014/08/05/watch-

    commander/

    Brzezinski, Z. (1970). Between two ages: Americas role in the techotronic era. New York: The Viking

    Press.

    Ingram, D. (2015, March 10). NSA sued by Wikimedia, rights groups over mass surveillance.

    Reuters. Retrieved from: http://www.reuters.com/article/2015/03/10/us-usa-nsa-wikipedia-

    idUSKBN0M60YA20150310