Page 142 - Privacy in a Cyber Age Policy and Practice
P. 142

130  PRIVACY IN A CYBER AGE

                            3. The Programs Are Not Effective

           A common claim against the NSA programs under discussion, and against
                                                              62
           other national security programs, is that they are not effective.  This is a
           particularly potent argument for those who oppose these measures because
           if the programs are ineffectual, presumably nobody will seek to support
           them no matter how little they infringe upon rights. By contrast, if the pro-
           grams are proven to be effective, then at least some may begin to wonder if
           the associated gain in security does not justify some recalibration of rights.
              The government argues that PRISM and the collection of phone com-
           pany metadata disrupted fifty-four terrorist plots, one-fifth of which were
                                                        63
           to be carried out within the borders of the United States.  However, critics
           have questioned these statistics, expressing skepticism about the reliability
                                      64
           of government officials’ testimony  and the adequacy of the thwarted plots
                             65
           as a metric of efficacy.  Section F addresses the question of how to ensure
           the validity of these and other government claims.
                                                          66
              Critics especially wonder about phone surveillance.  Some point
           out that the program was not the “primary” tool in averting any terror-
                   67
           ist attacks,  and “would very likely fail a full cost-benefit analysis handily
           even only minimally taking into consideration privacy and civil liberties
                   68
           concerns.”  However, this criticism can be leveled against any program or
           instrument used by law enforcement authorities or national security agen-
           cies. Surely police cruisers or FBI files or even the U.S. Air Force are often
           but instruments that in conjunction with others bring about the required
           outcomes.
              There are obviously scores of situations in which phone records would
           be of obvious help, even if the records alone would not be sufficient to pre-
                                                            69
           vent an attack or to find those who committed acts of terror.  When the
           authorities caught one of the two Tsarnaev brothers (the pair responsible
           for the Boston Marathon bombing), there was reason to suspect that they
           were cooperating with others and that they planned more attacks, specifi-
           cally in New York City. It does not take a PhD in counterterrorism to realize
           that under those circumstances it was very useful to know who the Tsar-
           naev brothers were previously in contact with by phone. The same holds
           for efforts to find out if the Tsarnaev brothers acted on their own or were
           supplied, guided, or financed by overseas sponsors and, if so, by whom.
              One telling piece of evidence regarding the effectiveness of electronic
           surveillance programs is the fact that they hobbled bin Laden. He found
           out that he was unable to use any modern communication device to run
                                                                  70
           his terror organizations, which had branches on three continents.  He
           was reduced to using the same means of communication people used
           five thousand years ago—a messenger, which is a very slow, low volume,
   137   138   139   140   141   142   143   144   145   146   147