Page 122 - Privacy in a Cyber Age Policy and Practice
P. 122

110  PRIVACY IN A CYBER AGE

           violate privacy—these releases encounter several difficulties. Each piece of
           information released potentially helps the adversaries. This is, in effect, the
           way intelligence work is often done—by piecing together details released
           by various sources. Thus, the publication of information about which past
           operations of terrorists the government aborted could allow those groups
           to find out which of their plots failed because of American government
           interventions and which failed because of technical flaws, the weakness
           of their chosen agents, or some other reason. Also, it is nearly impossible
           to spell out how these cases unfolded without giving away details about
           sources and methods; that is, unless the government releases misleading
           details. Sooner or later, though, some whistleblower would likely expose
           the ploy, undermining the whole enterprise, which was meant to build
           trust in government. Thus, one intelligence official reports that the leaks
           regarding the NSA snooping programs have already led to terrorist groups
           “changing their communications behavior based on these disclosures,”
           meaning that we might “miss tidbits that could be useful in stopping the
           next plot.” 40
              Moreover, however much information about specific cases the gov-
           ernment releases, skeptics are sure to find details that need further clarifica-
           tion and documentation. (This is the reason public relations experts urge
           those whose misdeeds are under public scrutiny to “tell all” right from the
           start, which is a strategy that may serve well politicians who cheat on their
           spouses, but would not serve those who deal with combating terrorism.)
           Thus, following the uproar over PRISM, technology companies sought to
           “reassure users” by releasing reports on the frequency of government data
           requests. The result, as reported by The New York Times, was that “rather
           than provide clarity, the companies’ disclosures have left many questions
                      41
           unanswered.”  When NSA Director General Keith Alexander released
           details about how the agency’s surveillance programs had thwarted terrorist
                                               42
           plots, the media immediately asked for more.  Moreover, there is no way
           for the media to determine whether the released cases are typical or were
           chosen because they reflect well on the government.
              By contrast, a representative democracy approach suggests that one
           ought to search for ways to enhance the accountability and oversight
           power of various institutions including Congressional committees, the
           Foreign Intelligence Surveillance Act (FISA) appeal courts, the Govern-
           ment Accountability Office (GAO), various inspectors general, and privacy
           officers.
              A report on the operation of the Terrorist Finance Tracking Program
           (TFTP) provides a powerful example. A project developed by the U.S.
           Treasury, the TFTP collects large amounts of data from a financial messag-
           ing system, called Swift, that records data on financial transfers that were
   117   118   119   120   121   122   123   124   125   126   127