Data Epistemologies / Surveillance and Uncertainty

Total Page:16

File Type:pdf, Size:1020Kb

Data Epistemologies / Surveillance and Uncertainty University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2016 Data Epistemologies / Surveillance and Uncertainty Sun Ha Hong University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Communication Commons, Other Sociology Commons, and the Philosophy of Science Commons Recommended Citation Hong, Sun Ha, "Data Epistemologies / Surveillance and Uncertainty" (2016). Publicly Accessible Penn Dissertations. 1766. https://repository.upenn.edu/edissertations/1766 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/1766 For more information, please contact [email protected]. Data Epistemologies / Surveillance and Uncertainty Abstract Data Epistemologies studies the changing ways in which ‘knowledge’ is defined, promised, problematised, legitimated vis-á-vis the advent of digital, ‘big’ data surveillance technologies in early twenty-first century America. As part of the period’s fascination with ‘new’ media and ‘big’ data, such technologies intersect ambitious claims to better knowledge with a problematisation of uncertainty. This entanglement, I argue, results in contextual reconfigurations of what ‘counts’ as knowledge and who (or what) is granted authority to produce it – whether it involves proving that indiscriminate domestic surveillance prevents terrorist attacks, to arguing that machinic sensors can know us better than we can ever know ourselves. The present work focuses on two empirical cases. The first is the ‘Snowden Affair’ (2013-Present): the public controversy unleashed through the leakage of vast quantities of secret material on the electronic surveillance practices of the U.S. government. The second is the ‘Quantified Self’ (2007-Present), a name which describes both an international community of experimenters and the wider industry built up around the use of data-driven surveillance technology for self-tracking every possible aspect of the individual ‘self’. By triangulating media coverage, connoisseur communities, advertising discourse and leaked material, I examine how surveillance technologies were presented for public debate and speculation. This dissertation is thus a critical diagnosis of the contemporary faith in ‘raw’ data, sensing machines and algorithmic decision-making, and of their public promotion as the next great leap towards objective knowledge. Surveillance is not only a means of totalitarian control or a technology for objective knowledge, but a collective fantasy that seeks to mobilise public support for new epistemic systems. Surveillance, as part of a broader enthusiasm for ‘data-driven’ societies, extends the old modern project whereby the human subject – its habits, its affects, its actions – become the ingredient, the raw material, the object, the target, for the production of truths and judgments about them by things other than themselves. Degree Type Dissertation Degree Name Doctor of Philosophy (PhD) Graduate Group Communication First Advisor Carolyn Marvin Keywords data, knowledge, new media, surveillance, technology, uncertainty Subject Categories Communication | Other Sociology | Philosophy of Science | Sociology This dissertation is available at ScholarlyCommons: https://repository.upenn.edu/edissertations/1766 DATA EPISTEMOLOGIES / SURVEILLANCE AND UNCERTAINTY Sun-ha Hong A DISSERTATION in Communication Presented to the Faculties of the University of Pennsylvania in Partial Fulfilment of the Requirements for the Degree of Doctor of Philosophy 2016 Supervisor of Dissertation __________________________________ Carolyn Marvin, Frances Yates Professor of Communication Graduate Group Chairperson __________________________________ Joseph Turow, Robert Lewis Shayon Professor of Communication Dissertation Committee Sharrona Pearl, Assistant Professor of Communication Marwan Kraidy, Anthony Shadid Chair in Global Media, Politics & Culture DATA EPISTEMOLOGIES / SURVEILLANCE AND UNCERTAINTY COPYRIGHT 2016 SUN-HA HONG This work is licensed under the Creative Commons Attribution- NonCommercial-ShareAlike 3.0 License To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-sa/3.0/us/ iii Acknowledgements. The present work is entirely my own; yet in everything I write lies a debt to another. To the following, and to many others, I present this text as my thanks. Carolyn Marvin Sharrona Pearl | Marwan Kraidy Lauren Berlant | John Durham Peters Kelly Gates | Amit Pinchevski | José van Dijck Sandra Ristovska | Aaron Shapiro | Yoel Roth | Bo Mai Michel Foucault | Gilles Deleuze | Maurice Merleau-Ponty My family – past, present and future and Jessica for their many sacrifices iv ABSTRACT DATA EPISTEMOLOGIES / SURVEILLANCE AND UNCERTAINTY Sun-ha Hong Carolyn Marvin Data Epistemologies studies the changing ways in which ‘knowledge’ is defined, promised, problematised, legitimated vis-à-vis the advent of digital, ‘big’ data surveillance technologies in early twenty-first century America. As part of the period’s fascination with ‘new’ media and ‘big’ data, such technologies intersect ambitious claims to better knowledge with a problematisation of uncertainty. This entanglement, I argue, results in contextual reconfigurations of what ‘counts’ as knowledge and who (or what) is granted authority to produce it – whether it involves proving that indiscriminate domestic surveillance prevents terrorist attacks, to arguing that machinic sensors can know us better than we can ever know ourselves. The present work focuses on two empirical cases. The first is the ‘Snowden Affair’ (2013-Present): the public controversy unleashed through the leakage v of vast quantities of secret material on the electronic surveillance practices of the U.S. government. The second is the ‘Quantified Self’ (2007-Present), a name which describes both an international community of experimenters and the wider industry built up around the use of data-driven surveillance technology for self-tracking every possible aspect of the individual ‘self’. By triangulating media coverage, connoisseur communities, advertising discourse and leaked material, I examine how surveillance technologies were presented for public debate and speculation. This dissertation is thus a critical diagnosis of the contemporary faith in ‘raw’ data, sensing machines and algorithmic decision-making, and of their public promotion as the next great leap towards objective knowledge. Surveillance is not only a means of totalitarian control or a technology for objective knowledge, but a collective fantasy that seeks to mobilise public support for new epistemic systems. Surveillance, as part of a broader enthusiasm for ‘data-driven’ societies, extends the old modern project whereby the human subject – its habits, its affects, its actions – become the ingredient, the raw material, the object, the target, for the production of truths and judgments about them by things other than themselves. vi Table of Contents. INTRODUCTION. ..................................................................................................... 1 METHODS AND AIMS ............................................................................................... 16 ‘RAW DATA’ ............................................................................................................. 22 1. RECESSIVE OBJECTS. ....................................................................................... 31 THE SNOWDEN FILES ............................................................................................... 42 RECESSIVE OBJECTS .................................................................................................. 72 THE LONE WOLVES ................................................................................................. 91 2. DATA’S INTIMACY. ........................................................................................ 108 DATA’S INTIMACY.................................................................................................. 120 DATA’S PRIVILEGE ................................................................................................. 133 DATA SKEPTICISM .................................................................................................. 147 KNOW THYSELF ..................................................................................................... 157 3. KNOWLEDGE SIMULATIONS. .................................................................... 171 SUBJUNCTIVITY....................................................................................................... 176 FABRICATION ......................................................................................................... 194 INTERPASSIVITY ...................................................................................................... 207 ZERO-DEGREE RISK ............................................................................................... 230 JUST-IN-CASE POLITICS .......................................................................................... 244 4. HONEYMOON OBJECTIVITY. ..................................................................... 246 DATA-SENSE .......................................................................................................... 252 HONEYMOON OBJECTIVITY ................................................................................... 283 OF FORKING PATHS ..............................................................................................
Recommended publications
  • Foreign Interference with Democratic Institutions
    The Center for Ethics and the Rule of Law (CERL) at the University of Pennsylvania presents: FOREIGN INTERFERENCE WITH DEMOCRATIC INSTITUTIONS Featuring the 2017 Distinguished Haaga Lecture APRIL 18, 2017 Golkin 100, Fitts Auditorium | Penn Law CO-SPONSORED BY: CONFERENCE SCHEDULE TUESDAY, APRIL 18 | FITTS AUDITORIUM Ms. Carrie Cordero, Private practitioner and cybersecurity 1:00 – 2:30 PM expert; former Director of National Security Studies, PANEL 1: RUSSIAN CYBERHACKING Georgetown University Law Center AS AN ACT OF WAR? Mr. Luke Harding, Foreign Correspondent and former Moscow Bureau Chief, The Guardian Moderator: Prof. William Burke-White, Richard Perry Professor of Law and Director, Perry World House, University Dr. Timothy P. Murphy, President, Thomson Reuters Special of Pennsylvania Services; former FBI Deputy Director Col. Gary Corn, Staff Judge Advocate, US Cyber Command This program has been approved for 3.0 ethics CLE credits for Daniel (DJ) Rosenthal, Associate Managing Director, Kroll; Pennsylvania lawyers. CLE credit may be available in other former NSC Director for Counterterrorism and Senior Counsel jurisdictions as well. Attendees seeking CLE credit should at the ODNI and DOJ bring separate payment in the amount of $100.00 ($50.00 public interest/non-profit attorneys) cash or check made payable to Dr. Fred Kagan, Resident Scholar and Director, Critical Threats The Trustees of the University of Pennsylvania. Project, American Enterprise Institute Sean Kanuck, Center for International Security and Cooperation, Stanford University; former U.S. National 4:30 – 6:00 PM Intelligence Officer for Cyber Issues from 2011-2016 The 2017 Distinguished Haaga Lecture: Mr. David Sanger, Chief Washington Correspondent, The New York Times RUSSIAN MEDDLING IN THE 2016 PRESIDENTIAL ELECTION: IMPLICATIONS FOR THE RULE OF LAW 2:30 – 2:45 PM Speaker: General Michael Hayden BREAK Moderator: Prof.
    [Show full text]
  • Case Study of NETRA
    Network Protocols and Algorithms ISSN 1943-3581 2016, Vo l . 8, No. 4 Internet Traffic Surveillance & Network Monitoring in India: Case Study of NETRA Rajan Gupta Dept. of Computer Science, Faculty of Mathematical Sciences, University of Delhi 1st Floor, North Campus, Delhi – 110007, India E-mail: [email protected], [email protected] Sunil Kumar Muttoo Dept. of Computer Science, Faculty of Mathematical Sciences, University of Delhi 1st Floor, North Campus, Delhi – 110007, India Received: October 20, 2016 Accepted: December 30, 2016 Published: December 31, 2016 DOI: 10.5296/npa.v8i4.10179 URL: http://dx.doi.org/10.5296/npa.v8i4.10179 Abstract Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues.
    [Show full text]
  • Mutual Watching and Resistance to Mass Surveillance After Snowden
    Media and Communication (ISSN: 2183-2439) 2015, Volume 3, Issue 3, Pages 12-25 Doi: 10.17645/mac.v3i3.277 Article “Veillant Panoptic Assemblage”: Mutual Watching and Resistance to Mass Surveillance after Snowden Vian Bakir School of Creative Studies and Media, Bangor University, Bangor, LL57 2DG, UK; E-Mail: [email protected] Submitted: 9 April 2015 | In Revised Form: 16 July 2015 | Accepted: 4 August 2015 | Published: 20 October 2015 Abstract The Snowden leaks indicate the extent, nature, and means of contemporary mass digital surveillance of citizens by their intelligence agencies and the role of public oversight mechanisms in holding intelligence agencies to account. As such, they form a rich case study on the interactions of “veillance” (mutual watching) involving citizens, journalists, intelli- gence agencies and corporations. While Surveillance Studies, Intelligence Studies and Journalism Studies have little to say on surveillance of citizens’ data by intelligence agencies (and complicit surveillant corporations), they offer insights into the role of citizens and the press in holding power, and specifically the political-intelligence elite, to account. Atten- tion to such public oversight mechanisms facilitates critical interrogation of issues of surveillant power, resistance and intelligence accountability. It directs attention to the veillant panoptic assemblage (an arrangement of profoundly une- qual mutual watching, where citizens’ watching of self and others is, through corporate channels of data flow, fed back into state surveillance of citizens). Finally, it enables evaluation of post-Snowden steps taken towards achieving an equiveillant panoptic assemblage (where, alongside state and corporate surveillance of citizens, the intelligence-power elite, to ensure its accountability, faces robust scrutiny and action from wider civil society).
    [Show full text]
  • Through a PRISM, Darkly(PDF)
    NANOG 59 – October 7, 2013 Through a PRISM, Darkly Mark Rumold Staff Attorney, EFF NANOG 59 – October 7, 2013 Electronic Frontier Foundation NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 What we’ll cover today: • Background; what we know; what the problems are; and what we’re doing • Codenames. From Stellar Wind to the President’s Surveillance Program, PRISM to Boundless Informant • Spying Law. A healthy dose of acronyms and numbers. ECPA, FISA and FAA; 215 and 702. NANOG 59 – October 7, 2013 the background NANOG 59 – October 7, 2013 changes technologytimelaws …yet much has stayed the same NANOG 59 – October 7, 2013 The (Way) Background • Established in 1952 • Twin mission: – “Information Assurance” – “Signals Intelligence” • Secrecy: – “No Such Agency” & “Never Say Anything” NANOG 59 – October 7, 2013 The (Mid) Background • 1960s and 70s • Cold War and Vietnam • COINTELPRO and Watergate NANOG 59 – October 7, 2013 The Church Committee “[The NSA’s] capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything. Telephone conversations, telegrams, it doesn't matter. There would be no place to hide.” Senator Frank Church, 1975 NANOG 59 – October 7, 2013 Reform • Permanent Congressional oversight committees (SSCI and HPSCI) • Foreign Intelligence Surveillance Act (FISA) – Established requirements for conducting domestic electronic surveillance of US persons – Still given free reign for international communications conducted outside U.S. NANOG 59 – October 7, 2013 Changing Technology • 1980s - 2000s: build-out of domestic surveillance infrastructure • NSA shifted surveillance focus from satellites to fiber optic cables • BUT: FISA gives greater protection for communications on the wire + surveillance conducted inside the U.S.
    [Show full text]
  • Open Letter on CIA MDR Regs- Final.Pdf
    To: Director of National Intelligence, James Clapper Director of the Central Intelligence Agency, David Petraeus Director of the Information Security Oversight Office, John Fitzpatrick February 23, 2012 Re: CIA Regulation change to 32 CFR Part 1908 allowing the Agency to charge requesters as high as $72 per hour for Mandatory Declassification Review requests. To whom it may concern: We the undersigned would like to call to your attention an alarming regulation that the Central Intelligence Agency entered into the Federal Register on 23 September 2011. Finalized without any notice for public comment, this regulation could cut off access to the most effective tool the public can use to request declassification of the CIA’s secret documents, the Mandatory Declassification Review (MDR) program. The regulation states that declassification reviews will now cost requesters up to $72 per hour, even if no information is found or released. The public must now also agree to pay a minimum of $15 in duplication fees. Throughout the government, and previously at CIA, MDR fees are commensurate to FOIA fees. Under FOIA, Congress stipulated that public interest, educational, journalism, and other fee waivers must be granted, when applicable under the statute. Furthermore, agencies must forfeit their right to collect some FOIA processing fees when they miss their processing deadline. The effect of the CIA’s new policy will be to price the public out of submitting MDR requests, a result not at all consonant with Obama Administration transparency policy in general or its declassification policy under Executive Order 13,526 in particular. The MDR process is a popular and successful tool for researchers, historians, public interest advocates and others, in part because of the independent accountability and oversight the program provides.
    [Show full text]
  • UNITED STATES DISTRICT COURT NORTHERN DISTRICT of INDIANA SOUTH BEND DIVISION in Re FEDEX GROUND PACKAGE SYSTEM, INC., EMPLOYMEN
    USDC IN/ND case 3:05-md-00527-RLM-MGG document 3279 filed 03/22/19 page 1 of 354 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF INDIANA SOUTH BEND DIVISION ) Case No. 3:05-MD-527 RLM In re FEDEX GROUND PACKAGE ) (MDL 1700) SYSTEM, INC., EMPLOYMENT ) PRACTICES LITIGATION ) ) ) THIS DOCUMENT RELATES TO: ) ) Carlene Craig, et. al. v. FedEx Case No. 3:05-cv-530 RLM ) Ground Package Systems, Inc., ) ) PROPOSED FINAL APPROVAL ORDER This matter came before the Court for hearing on March 11, 2019, to consider final approval of the proposed ERISA Class Action Settlement reached by and between Plaintiffs Leo Rittenhouse, Jeff Bramlage, Lawrence Liable, Kent Whistler, Mike Moore, Keith Berry, Matthew Cook, Heidi Law, Sylvia O’Brien, Neal Bergkamp, and Dominic Lupo1 (collectively, “the Named Plaintiffs”), on behalf of themselves and the Certified Class, and Defendant FedEx Ground Package System, Inc. (“FXG”) (collectively, “the Parties”), the terms of which Settlement are set forth in the Class Action Settlement Agreement (the “Settlement Agreement”) attached as Exhibit A to the Joint Declaration of Co-Lead Counsel in support of Preliminary Approval of the Kansas Class Action 1 Carlene Craig withdrew as a Named Plaintiff on November 29, 2006. See MDL Doc. No. 409. Named Plaintiffs Ronald Perry and Alan Pacheco are not movants for final approval and filed an objection [MDL Doc. Nos. 3251/3261]. USDC IN/ND case 3:05-md-00527-RLM-MGG document 3279 filed 03/22/19 page 2 of 354 Settlement [MDL Doc. No. 3154-1]. Also before the Court is ERISA Plaintiffs’ Unopposed Motion for Attorney’s Fees and for Payment of Service Awards to the Named Plaintiffs, filed with the Court on October 19, 2018 [MDL Doc.
    [Show full text]
  • Plaintiff's Exhibit 17
    Case 1:15-cv-00662-TSE Document 168-21 Filed 12/18/18 Page 1 of 4 Wikimedia Foundation v. NSA No. 15-cv-0062-TSE (D. Md.) Plaintiff’s Exhibit 17 12/17/2018 IC ON THE RECORD • DNI Declassifies Intelligence Community Documents... Case 1:15-cv-00662-TSE Document 168-21 Filed 12/18/18 Page 2 of 4 IC ON THE RECORD Section 702 Overview CY2017 Transparency Report CY2016 SIGNALS INTEL REFORM REPORT IC TRANSPARENCY PLAN DNI Declassifies Intelligence Community Documents Regarding Collection Under Section 702 of the Foreign Intelligence Surveillance Act (FISA) Wednesday, August 21, 2013 In June, President Obama requested that Director of National Intelligence James R. Clapper declassify and make public as much information as possible about certain sensitive NSA programs while being mindful of the need to protect sensitive classified intelligence and national security. Consistent with this directive and in the interest of increased transparency, DNI Clapper has today authorized the declassification and public release of a number of documents pertaining to the Intelligence Community’s collection under Section 702 of the Foreign Intelligence Surveillance Act (FISA). DNI Clapper has determined that the release of these documents is in the public interest. These documents and other unclassified information related to foreign intelligence surveillance activities are available on a new Intelligence Community website established at the direction of the President. The new www.icontherecord.tumblr.com is designed to provide immediate, ongoing and direct access to factual information related to the lawful foreign surveillance activities carried out by the U.S. Intelligence Community. The Administration is undertaking a careful and thorough review of whether and to what extent additional information or documents pertaining to this program may be declassified, consistent with the protection of national security.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • False Dilemma Wikipedia Contents
    False dilemma Wikipedia Contents 1 False dilemma 1 1.1 Examples ............................................... 1 1.1.1 Morton's fork ......................................... 1 1.1.2 False choice .......................................... 2 1.1.3 Black-and-white thinking ................................... 2 1.2 See also ................................................ 2 1.3 References ............................................... 3 1.4 External links ............................................. 3 2 Affirmative action 4 2.1 Origins ................................................. 4 2.2 Women ................................................ 4 2.3 Quotas ................................................. 5 2.4 National approaches .......................................... 5 2.4.1 Africa ............................................ 5 2.4.2 Asia .............................................. 7 2.4.3 Europe ............................................ 8 2.4.4 North America ........................................ 10 2.4.5 Oceania ............................................ 11 2.4.6 South America ........................................ 11 2.5 International organizations ...................................... 11 2.5.1 United Nations ........................................ 12 2.6 Support ................................................ 12 2.6.1 Polls .............................................. 12 2.7 Criticism ............................................... 12 2.7.1 Mismatching ......................................... 13 2.8 See also
    [Show full text]
  • A Public Accountability Defense for National Security Leakers and Whistleblowers
    A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the
    [Show full text]
  • September 15, 2014 Dear Members of Congress, We, the Undersigned
    September 15, 2014 Dear Members of Congress, We, the undersigned civil liberties advocates, organizations, and whistleblowers, are alarmed that Senator Leahy's recently introduced bill, the USA FREEDOM Act (S. 2685), legalizes currently illegal surveillance activities, grants immunity to corporations that collaborate to violate privacy rights, reauthorizes the PATRIOT Act for an additional 2.5 years, and fails to reform EO 12333 or Section 702, other authorities used to collect large amounts of information on Americans. For these reasons, we encourage both the House and the Senate to oppose this legislation in its current form. Governmental security agencies' zeal for collecting Americans' personal information without regard for cost, efficacy, legality, or public support necessitates that Congress act to protect the rights of residents across the United States and around the globe. Our fundamental civil rights – the human rights we hold dear – are not adequately protected by either the Senate or House versions of the USA FREEDOM Act. The reckless actions of top officials charged with ensuring national security – from lying to Congress to secretly weakening security standards to hacking the communications of our allies – has undermined global confidence that the United States can act as an ethical Internet steward. The 11th-hour gutting of the USA FREEDOM Act in the House of Representatives and the CIA’s recent illegal spying on the U.S. Senate underscore just how powerful and out of control this surveillance regime has become. Time and again, these agencies have relied on aggressive manipulation of legal loopholes to thoroughly undermine safeguards and checks and balances. As just one example of why clarity in law is now necessary, the collection of information on all domestic phone calls was justified under the “relevancy” standard in the PATRIOT Act.
    [Show full text]