PRISM and Privacy

This week’s big story was the series of revelations about government spying on ordinary Americans. I don’t see the Weekly Sift as a breaking-news blog, but before we can get around to reflecting on how upset we should be and what we should do about it, let’s establish what happened.

Verizon metadata. It started Wednesday, with Glenn Greenwald’s scoop that Verizon turns its caller records over to the NSA every day. The report was based on a copy of an order from the secret FISA court that oversees the government’s secret snooping. The order, in turn, is based on an expansive interpretation of a provision of the Patriot Act.

Leaks during the Bush administration revealed that call records were being swept up into a massive government database, but

Until now, there has been no indication that the Obama administration implemented a similar program.

Three related New Yorker articles are worth reading: a Seymour Hersh article about what the NSA was doing in 2006, Jane Mayer explaining just how much about the content of a phone call can be deduced from metadata, and (laughing to keep your sanity) Andy Borowitz’s satirical “Letter to Verizon Customers” in which the company explains that

While the harvesting and surveillance of your domestic phone calls were not a part of your original Verizon service contract, the National Security Agency is providing this service entirely free of charge.

Probably there’s nothing special about Verizon; that’s just the court order we happen to have.

PRISM. Thursday, The Guardian and The Washington Post published a leaked slide presentation on the top-secret PRISM program, in which “search history, the content of emails, file transfers and live chats” are collected directly from the servers of major U.S. service providers like Google, Facebook, and Apple. As the then-anonymous leaker claimed, “They quite literally can watch your ideas form as you type.”

Edward Snowden. This weekend, I was explaining to my wife that I didn’t understand why the leaker was staying anonymous, since the NSA was going to figure it out anyway. He might as well orchestrate the announcement himself, rather than be introduced to the world while doing a perp walk.

It turns out he was having similar thoughts. Saturday Edward Snowden was revealed as the whistleblower. Currently hiding out in Hong Kong, Snowden gave this interview to Glenn Greenwald.

Defending surveillance. A variety of sources jumped to the defense of the newly-exposed programs. President Obama emphasized that the programs “do not involve listening to people’s phone calls, do not involve reading the e-mails of US citizens and US residents.” And there is oversight to prevent abuse:

Your duly elected representatives have consistently been informed. … This program, by the way, is fully overseen not just by Congress, but by the FISA court, a court specially put together to evaluate classified programs. … We have established a process and a procedure that the American people should feel comfortable about.

Obama’s bottom-line justification of the spying programs is: “They help us prevent terrorist attacks.”

Democrat Dianne Feinstein and Republican Saxby Chambliss — the ranking members of the Senate Intelligence Committee — released a joint statement:

The intelligence community has successfully used FISA authorities to identify terrorists and those with whom they communicate, and this intelligence has helped protect the nation. The threat from terrorism remains very real and these lawful intelligence activities must continue, with the careful oversight of the executive, legislative and judicial branches of government.

Opposition in Congress comes from an unusual right/left alliance: liberals like Ron Wyden and Mark Udall, as well as conservatives like Rand Paul.

Four levels of privacy loss. Now we’re getting into the how-should-I-think-about-this part. When I think about “loss of privacy”, I might be talking about four different things:

  1. The modern world collects a lot of information about me. We don’t usually think about it, but just about everything we do leaves a record somewhere. When I walk past a security camera, make a phone call, buy something with a credit card, or go through the E-Z-Pass toll gate, something gets recorded. Most of that security video is never watched by anybody, but it could be, and that by itself might intimidate me out of doing something perfectly legal and harmless, like dancing to the Muzak when I’m by myself in an elevator.
  2. My information could be gathered together into a database, even if no one is targeting me. It’s one thing to imagine a rogue security guard in my building getting obsessed with me (or with my daughter, if I had one) and scanning security tapes. It’s another thing entirely to worry about somebody with access to security cameras everywhere, as well as cell-phone tracking data, credit-card data, TSA body scans, and so on. Again, I’m not important enough for anybody to bother, but the mere possibility is worrisome.
  3. I might be investigated by the government. Think about J. Edgar Hoover tapping Martin Luther King’s phone. Just exercising your constitutional rights in a totally legal way — organizing the next Occupy Wall Street, say — could put you under the government’s microscope. Suddenly, every illegal or embarrassing thing you’ve ever done (no matter how trivial) might come to light and be used to tear you down.
  4. Someday the government might routinely keep track of everyone. So far this is science fiction, because you’d need to hire half the country to watch the other half. But as artificial intelligence improves and processing power grows, the idea of a system that processes all that gathered information and draws conclusions about everybody becomes less and less far-fetched

Now we’re in a position to think about the things we learned this week about government surveillance. It’s tempting to be mad at the government for our level-1 loss of privacy, but that’s just life in the modern world. You need to put that aside.

The Level-2 issues. This week’s revelations indisputably showed level-2 loss of privacy. Information that already existed in separate places is being pulled together into big government databases.

Anybody who watches prime-time TV cop shows shouldn’t be terribly surprised that information can be pulled together about specific people for some good reason. Castle and Beckett are constantly studying suspects’ financial records, looking for specific cars on traffic cams, getting businesses to turn over security-cam videotapes, and so on. The Boston Marathon bombing investigation was like CSI: Real World. We expected investigators to have video of everything and records of everything. If we were disappointed, it was that the FBI couldn’t assemble and process that information to zero in on the bombers faster.

The public is mostly OK with this — supports it, even — as long as the information is handled properly: The government has a good reason to assemble the information; investigators use it to accomplish that legitimate purpose; and after the purpose is fulfilled, they dispose of the information they don’t need. We assume that Castle and Beckett stop tracking a suspect’s financials after his alibi checks out, and that after the case closes, they do their best to forget what they’ve learned. It would creep us out to see them compiling private information just to satisfy their curiosity.

So the idea that the government might be collecting everybody’s phone and/or internet records and storing them forever — that’s a problem.

Level 3 issues. The government’s defense amounts to: Level 2 doesn’t matter as long as we have good procedures in place to protect Level 3. In other words, compiling the database shouldn’t bother you; the real violation of privacy doesn’t happen until somebody accesses the database.

I’m not persuaded, mostly because the safeguards are as invisible to me as the programs were until Wednesday. Courts that have to publish their opinions sometimes make outrageous rulings, and we can respond by pressuring Congress to change the law or starting a movement to amend the Constitution. But if a secret court makes an outrageous ruling, none of that happens, because we don’t hear about it.

Likewise, police sometimes exceed their authority, as they often did during the Occupy protests. When the excess takes the form of pepper spray or a baton to the head, it might show up on YouTube or result in a lawsuit. But when the excess is the misuse of a database, you might never know. Even if you suffer tangible effects, you probably won’t be sure what happened.

One of the things Snowden emphasized in his Greenwald interview was that policy safeguards aren’t much to stand on, particularly if the details of the policy are secret. If you’re a loyal Democrat, you might imagine that President Obama is honestly doing his best to keep the databases from being abused; if you’re  a Republican, you might have similarly trusted President Bush. Good for them if they really did prevent abuse, but the long-term threat is still there.

We have had untrustworthy presidents in the past and we will undoubtedly have another one someday. Or we’ll have an emergency that makes everybody temporarily forget all those namby-pamby notions of privacy. Policies can change in a blink, or people can just stop enforcing them. And if they’re secret policies, no one will know.

Snowden calls this “turnkey tyranny”.

What can be done? This is the hardest kind of thing to fix through the democratic process. First, because a lot of Americans, maybe a majority, would buy the idea that the threat of terrorism justifies ditching some abstract ideals about privacy. (My hunch is that this is an issue where you can get wildly different poll results by re-phrasing the question.)

Even if a majority is solidly against this, it might survive — just as 70% support levels haven’t produced a universal background check law. On the one hand you have the threat of abuses that can probably be kept secret; on the other the threat of a terrorist attack that will dominate the news for weeks. Politicians may decide not to take the chance.

Even if we can elect people we believe oppose such programs … well, we thought Obama did too.

So I’m about to say something significantly more radical than you’re used to reading on this blog: I don’t see this changing without direct action, and probably not without monkey-wrenching. Somehow — and I’m open to suggestions about how — ordinary people have to make this kind of surveillance not work, and frustrate and embarrass the people who try to implement it.

Should it come to that? Yeah, I think it should. I know the spies think they’re keeping us safe from terrorism, and God knows I don’t support terrorism. But long-term, I believe the surveillance state itself is a bigger threat than what it claims to be protecting us from.

To get yourself thinking in the right direction, I recommend a 2008 young-adult novel by Boing-Boing editor Cory Doctorow: Little Brother (as compared to Big Brother). Turns out you can download it for free. I found it a compelling read, and it does for cyber-privacy what Edward Abbey’s The Monkey Wrench Gang did for the environment a generation ago.

Post a comment or leave a trackback: Trackback URL.


  • TRPChicago  On June 10, 2013 at 1:44 pm

    #1. We’re there, and by our on volition. We leave a trail with every keystroke on a web site.
    #2. We’re essentially there. Check out Claritas and the several other businesses that specialize (and have for three decades) in accumulating consumer-oriented and politically/issues-oriented data. Some of this is individual-specific, much is group-specific, but the group can be as small as the area of the four digits at the end of your ZIP code.
    #3. Yes, although “tear you down” is pretty judgmental. Snatching up traffic tickets and locating tax dead beats might also be in this category. I’m somewhat more sanguine about this given the involvement of a second branch of government. (Hint: not Congress!) But certainly, the public discussion needs to start with the potentials in this category.
    #4. Yes. The TV show Person of Interest does not sound as far out as it might have when its season started!

    We need Bill-Moyers type “conversations” that deal in depth with reasonable expectations of privacy in a high-tech world and the vulnerabilities to security inherent in having – and enjoying – an “open society.” Chief among these must be the recognition that our law enforcement/criminal justice system model of catch-the-perp may not be sufficiently attuned to the threats presented by what one commentator has styled “lone wolf terrorism.”

  • Justin Siemaszko  On June 10, 2013 at 2:05 pm

    I’m really surprised that more people haven’t brought up the 3 felonies per day issue… it pairs with this snooping issue to create horrifying results.

    On average, it’s assumed that each of us are accidentally committing three trivial, harmless crimes per day, every day. Combining that with the idea of our entire lives being recorded and suddenly literally all of us could be tried and found guilty of crimes at any time. All that needs to happen is for someone to care enough about us to press charges.

  • weeklysift  On June 10, 2013 at 2:33 pm

    I should have included links to articles claiming that PRISM is not as sweeping as The Guardian made it sound. Here’s one.

  • Stephanie  On June 10, 2013 at 7:20 pm

    Just a couple points to provoke thought:
    1. If you thought it realistic that terrorism could touch you in your daily routine (like at the grocery store or movie theater), the threat of terrorism might disturb you more than the loss of privacy. Most of us still believe we are safe and feeling safe is a major form of freedom. When you no longer feel safe in daily life, you have no freedom. In a country suffering active terrorism attacks, your whole day and all your choices are somewhat arranged around safety and that does not feel free at all.

    2. If terrorists were able to carry off a series of successful acts of terror in this country, then privacy would really disappear and people would be grateful for it.

    3. Nothing encourages more acts of terrorism as much as a successful act of terrorism. One act of terrorism that kills and maims brings out of the woodwork a plethora of other terrorists with causes as well as crackpots with delusions of grandeur and depressed people who would like to suicide by cop.

    4. When I heard Snowden speak on television, I wondered if he realized that he was giving the Chinese government a reason to pick him up and hold him for interrogation and whether he realized that he was giving terrorists a reason to try to kidnap him. And I think he should dread both of those groups far more than an American prison.

    Just sayin’

    • weeklysift  On June 11, 2013 at 8:25 am

      One way the surveillance debate resembles the torture debate is that we can’t check the government’s claims about how effective this is. Are we actually getting anything for the rights we’re surrendering and the risks to our democracy? I’m skeptical.

      On #3: This seems to be how things work for lone-gunman mass shootings, but I’m not so sure about political terrorism. I wonder if we might reduce terrorism better if we stopped going around the world pissing people off. When your little sister is written off as “collateral damage”, it makes you want to strike back.

      If I were trying to build an American terrorist network (and I’m not; applications will be rejected), I’d start by forming a group to teach people how to keep themselves safe from government spying. Then I’d sound out the stars of that class about their political leanings. By giving millions of people a legitimate grievance with the government, the surveillance state might end up INCREASING terrorism. Privacy is a gateway grievance.

  • Krissy  On June 10, 2013 at 7:24 pm

    Diane Fienstein is usually wrong on every single issue. Even her feelings about Harvey Milk were creepy. I hope the voters get smart to her and to the rest of the authoritarians in training. Yeah the internet was a new technology and it took time for people to recognize what was being done with all that data. We don’t need dated ideas like hers in office.

  • Kimc  On June 11, 2013 at 1:20 am

    The way to defeat terrorism is to not be terrorized by it. When it doesn’t work, it will stop.

  • kreatywna reklama  On June 21, 2013 at 12:49 am

    Thank you for any other informative blog. The place else could I am getting that
    type of information written in such an ideal means?
    I’ve a undertaking that I’m just now running on, and I’ve been at the look out for such info.


Leave a Reply to Kimc Cancel reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: