Page 521 - Battleground The Media Volume 1 and 2
P. 521

00  |  Surve llance and Pr vacy

                          The rapid development of digital information-gathering and storage devices
                       has  facilitated  the  creation  of  searchable  electronic  databases.  Digitization  is
                       making it easier to transfer, copy, compare, and combine personal information
                       stored in both public and private databases. State and commercial entities can
                       use search algorithms to sort through such data and identify both potential con-
                       sumers and potential suspects—a process commonly referred to as data mining.
                       When millions of records can be stored on portable hard drives, it also becomes
                       easier to steal, copy, or circulate this information.
                          As we go online to shop, to stay in touch, and to work, we generate an ever
                       more  comprehensive  portrait  of  searchable  electronic  data  about  ourselves.
                       Search engines collect information about the keywords we use to surf the in-
                       ternet, browsers gather data about the sites we visit online, ATM machines keep
                       track of where we withdraw money, and cell phone companies can monitor our
                       movements throughout the course of the day. We are rapidly moving toward
                       what Bill Gates has described as a “fully documented life”—one in which all of
                       our movements and transactions are redoubled by information about them that
                       can be digitally stored and searched.


                          BLurring ThE BounDariEs
                          In the United States, there has been a tendency on the part of the populace
                       to distinguish between state and commercial surveillance and to be more con-
                       cerned about the former. In the post-9/11 era, however, the distinction between
                       these two forms of surveillance is becoming increasingly blurred, as govern-
                       ment officials seek access to commercial databases to identify potential security
                       threats. Database companies are building lucrative new markets in government
                       security contracts, many of which are classified—sometimes, ironically, in the
                       name of privacy protection (O’Harrow, Jr. 2005).


                goVernMent surVeillanCe and national seCurity

                One of the ongoing debates in the government’s declared war on terrorism is likely to be
                just how much surveillance power it should be granted in the name of national security. In
                December 2005, the New York Times revealed that President George W. Bush had autho-
                rized a covert National Security Agency program to monitor international telephone con-
                versations of U.S. residents suspected of links to potential terrorist threats. The program
                was controversial because it sidestepped laws requiring the government to obtain search
                warrants through a special court designated for this purpose by the Foreign Intelligence
                Surveillance Act. The program was deemed illegal by a U.S. district judge in 2006, but the
                decision was appealed by the government. Republican legislators responded to the contro-
                versy by seeking to pass legislation that would officially sanction the wiretapping program.
                The  legal  back-and-forth  is  part  of  an  ongoing  struggle  between  a  government  seeking
                surveillance power in the name of national security and a populace wary of unaccountable
                state monitoring.
   516   517   518   519   520   521   522   523   524   525   526