Page 148 - Privacy in a Cyber Age Policy and Practice
P. 148

136  PRIVACY IN A CYBER AGE

           collecting and storing records in computers amounts to a search, general
           or otherwise—a point next discussed.


                              4. Computers Don’t Search

           A major, indeed critical, feature of the phone surveillance program,
           ignored by many critics, is that it merely stores the records and that par-
           ticularized suspicion and a court order is required to access and examine
           the records of any individual. It is hence important to note that computers
           do not violate privacy, although they vastly increase the risk that privacy
           might be violated. (How to best address and mitigate that risk is discussed
           in Section F.)
              Computers do not gossip. They see no evil, hear no evil, and speak no
           evil. They do not engage in pillow talk, leak information to the press, or sell
           information to the Cubans, Chinese, or anyone else. Hence, those who are
           concerned with finding a reasonable balance between security and privacy
           should focus on the interface between computers and human agents. That
           is, they ought to seek to ensure that once the computers flag particular
           individuals this information is revealed only to law enforcement authori-
           ties and used by them in legal and accountable ways. For this reason, the
           revelation in July 2014 that most intercepted communications do not
           belong to legally targeted foreigners and instead belong to U.S. citizens or
           residents is of little concern as long as actual analysis of the communica-
           tions focuses narrowly on counterterrorism and U.S. communications are
           minimized according to law. 114
              In short, privacy advocates would have good reason for concern if the
           massive collection of records were to include content and if records of who
           called whom were to be made available to all comers or even to various law
           enforcement agencies. However, if these records are merely collected and
           stored so that they will be readily available once a court order is granted for
           an individualized search—most of the issue is moot beyond the question
           of how to ensure that access to the computers themselves is under tight
           surveillance.


                              5.  Keep in Private Hands?

           Critics argue that, rather than collect and store phone records in bulk, the
           government should wait until it has particularized suspicion and a court
           order and then collect the relevant records of that person from the phone
           companies. 115  However, both prudential and principled reasons favor the
           government position on this point. Most important, phone companies are
   143   144   145   146   147   148   149   150   151   152   153