Page 145 - Privacy in a Cyber Age Policy and Practice
P. 145

BALANCING NATIONAL SECURITY AND INDIVIDUAL RIGHTS  133

           millions. According to one source, “It would take 400 million people to listen
                                                      84
           and read” through all global communications traffic.  As NSA Director
           Keith Alexander put it, “If you think that we would listen to everybody’s
           telephone calls and read everybody’s emails to connect the dots, how do
           you do that? And the answer is, that’s not logical.” 85
             Actually, the program collects phone records that show who called what
           other numbers, the times the calls were placed, and their duration—but
           no more. (Note that even the various leakers did not claim that the con-
           tent of phone calls was collected.) This is akin to collecting the envelope
           as opposed reading the actual correspondence enclosed—a practice that
           is, in fact, regularly carried out in bulk by the U.S. Postal Service (USPS).
           Indeed, the USPS “photographs the exterior of every piece of paper mail
           that is processed in the United States” and saves the recorded data for an
           unknown amount of time. 86
              The government reports that it collects and stores these records in order
           to have rapid access when it is needed and to stitch together various data;
           for some reason it neglects to mention that the phone companies keep
                                                 87
           the records only for only short periods of time  while security concerns
                             88
           require longer storage,  which necessitates the program.
             In short, given the security that comes with the gains engendered by
           ready access to this information and the fact that the intrusiveness of storing
           this information is low, phone surveillance, like mail surveillance, passes
           this part of the liberal communitarian test. It is justified on prudential,
           pragmatic, and technical grounds, as well as legal ones.


                      3. General Search and Individualized Suspicion

           Privacy advocates often argue that before the government searches anyone it
           should be required—indeed it is required, according to the Constitution—
           to present to a court of law evidence demonstrating that there exists strong
           reason (enough to convince a judge) to believe that the particular person
           is likely to be a criminal or a terrorist. Only then, according to these
                                                           89
           advocates, should said person be subjected to surveillance.  The phone
           surveillance program violates this rule on the face of it because it collects
           the records of millions of people for whom no particularized suspicion has
           been articulated. Thus, the ACLU filed a lawsuit seeking to halt the pro-
           gram on the grounds that the surveillance carried out was “warrantless and
           unreasonable.” 90
             However, the courts have long established (employing, in effect, a rather
           similar line of analysis to the liberal communitarian one outlined earlier)
           that when there is both a clear public interest and the privacy intrusion
   140   141   142   143   144   145   146   147   148   149   150