Page 150 - Privacy in a Cyber Age Policy and Practice
P. 150

138  PRIVACY IN A CYBER AGE

           closely associated with the violation of privacy. Actually, in the cyber age,
           these boundaries have been blurred. If the government has ready access
           to private data banks, they do not—by definition—provide extra privacy
           protection, and if the data banks are not readily accessible, they hinder
           counterterrorism drives.
              One may say that the phone companies could review the government
           requests and, thus, serve as a sort of privacy-protecting screen. However,
           on what basis could a phone company lawyer deny government access in
           the face of government claims that protecting national security requires
           such access? Should the government reveal to company lawyers, who
           would lack security clearance and the relevant experience and training
           when it comes to such matters, the reasons it is interested in a particular
           set of records? Should phone companies set up their own FISA-like courts
           to second-guess the government? The answer seems clear: the companies
           are not in a position to second-guess the government.
              The issue of accessibility is becoming more important as the govern-
           ment struggles to keep pace with encryption technology. In the wake of
           the NSA leaks, U.S. tech firms have faced a backlash not only from pri-
           vacy advocates 120  but from foreign governments and businesses concerned
           about U.S. surveillance. 121  In response, tech companies are strengthening
           their data security measures. 122  Particularly troubling to the effort to bal-
           ance privacy and security is the plan by some companies to encrypt their
           data, and their refusals to grant backdoors to the NSA. Indeed, Apple’s
           iPhone 6 has encryption capabilities that Apple itself cannot bypass, even if
           instructed to do so by a judge once it was established that the user is a ter-
           rorist. 123  I leave it to the lawyers to figure out if such encryption qualifies as
           obstruction of justice, but it surely violates the conception that reasonable
           searches should be allowed.
              In short, the key question related to having the records kept in private
           hands is whether they would be easily accessible to the government in case
           of a pressing national security need. If this were the case, it would be only
           cosmetically different from having the government store the records; if not,
           the government’s ability to fight terrorism would be hindered. Not only is
           guaranteed access to the records needed, sometimes on short notice, and
           technical reasons exist for allowing the government to keep the records—
           one should recognize that keeping these records in private hands adds little
           to privacy protection.
              Taking into account all these considerations, it seems that the phone
           surveillance program’s “correction” to the liberal communitarian balance
           between individual rights—especially privacy—and national security
           is limited and not excessively intrusive, abides by the constitution and
           prevailing law, is structured in a reasonable manner, and contributes to
   145   146   147   148   149   150   151   152   153   154   155