Page 137 - Privacy in a Cyber Age Policy and Practice
P. 137

BALANCING NATIONAL SECURITY AND INDIVIDUAL RIGHTS  125

           the public interest justified some redefinition or even curbing of rights; in
           others, they found that the threat level did not justify such infringement.
             For example, in New York Times Co. v. United States the court ruled that,
           by attempting to suppress the Pentagon Papers, the government failed to
           meet the “heavy burden of showing justification for the imposition of [prior
           judicial] restraint,” even though such restraint might be justified if the court
           believed that the release of the information would “surely result in direct,
                                                              11
           immediate, and irreparable damage to our Nation or its people.”  By con-
           trast, a court held in United States v. Hartwell that, although screenings by
           the U.S. Transportation Security Administration (TSA) violated privacy,
           they were nonetheless permissible because “preventing terrorist attacks
           on airplanes [was] of paramount importance” and, thus, the screenings
           “advance[d] the public interest” to the point where some violation of pri-
                         12
           vacy was justified.  This chapter follows the balanced approach taken by the
           courts rather than the one-sided advocacy of libertarians and authoritarians.

                          B. Basic Challenges and Responses

           Critics of both surveillance programs argue that terrorism has subsided
                                            13
           and hence these programs are not needed.  For instance, many statements
           about the NSA surveillance programs start by arguing that these programs
           infringe on this or that right and hence are unconstitutional and should
                     14
           be canceled.  Even after extensive pleading by the president, the Repub-
           lican Speaker of the House, and senior members of those congressional
           committees familiar with the programs, the House of Representatives
           came within twelve votes (205 to 217) of completely defunding the phone
                                 15
           records collection program.  Others stated that in establishing many of
           the antiterrorist measures enacted since 9/11, including the NSA programs
           in question, Congress was “reckless,’’ as the powers granted have proven
                                  16
           “unnecessary and overbroad.”  Others argue that terrorists can be handled
           with existing legal authorities and procedures, like other criminals. This
                                            17
           position is taken by Karen J. Greenberg,  the Director of the Center on
                                                    18
           National Security, the ACLU’s Anthony D. Romero,  and Attorney Gen-
                        19
                                                      20
           eral Eric Holder.  Europe also widely holds this view.  Still others argue
           that these surveillance programs are ineffectual and that the phone surveil-
           lance program has no proven benefits.
                                1. Threat Assessments

           Those who hold that terrorism has much subsided can draw on President
           Obama’s statements to prove their point. The president announced in May
   132   133   134   135   136   137   138   139   140   141   142