The Pendulum Effect: Comparisons Between the Snowden Revelations and the Church Committee

Total Page:16

File Type:pdf, Size:1020Kb

The Pendulum Effect: Comparisons Between the Snowden Revelations and the Church Committee CORE Metadata, citation and similar papers at core.ac.uk Provided by MURAL Information- Maynooth University & Communications Research Archive Library Technology Law, 2014 Vol. 23, No. 3, 192–219, http://dx.doi.org/10.1080/13600834.2014.970375 The pendulum effect: comparisons between the Snowden revelations and the Church Committee. What are the potential implications for Europe? Maria Helen Murphy* Law Department, National University of Ireland, Maynooth, Ireland This article considers how the pendulum metaphor can be applied to shifts in popular opinion concerning the right to privacy. At times, the media portrays privacy as an individualistic right, serving at the behest of criminals and terrorists. Every so often, however, an event occurs that starkly reminds the public of the value of privacy. Public opinion drives debate and this debate often leads to legal reform. The Church Committee, formed in response to the Watergate scandal, is a classic example of the effect the exposure of abuse can have on the regulation of privacy. Over time, however, legislative gains in privacy protection have a tendency to erode. In addition, extreme events, such as the terrorist attacks of 9/11, can cause the pendulum to swing back to the opposite position. Following the exposure of mass surveillance practices by Edward Snowden, the world has, once again, been questioning government surveillance activities. This article seeks to consider the transatlantic impact of the National Security Agency revelations. Transparency is highlighted as a crucial regulating force on excessive government interference with privacy rights. Keywords: Snowden; surveillance; privacy; data retention; European Union Introduction The concept of a swinging pendulum frequently serves as a political metaphor, illustrat- ing oscillations from one policy position to another over time.1 The metaphor borrows from the scientific principle that the restoring force of gravity, combined with the mass of a pendulum, will cause it to swing back and forth indefinitely. In addition to being used to portray electoral swings,2 trends in criminal justice,3 and education Downloaded by [Maynooth University Library] at 08:41 24 October 2017 *Email: [email protected] 1See, for example, M Lebo and H Norpoth, ‘The PM and the Pendulum: Dynamic Forecasting of British Elections’ (2007) 37 BJ Pol S 71; S Ranchod-Nilsson, ‘Gender Politics and the Pendulum of Political and Social Transformation in Zimbabwe’ (2006) 32 JSAS 49; B Jackson, The Challenge of Domestic Intelligence in a Free Society: A Multidisciplinary Look at the Creation of a US Domestic Counterterrorism Intelligence Agency (Rand Corporation, 2009) 90, 112. 2M Harrop, ‘The Pendulum Swings: The British Election of 1997’ (1997) 32 Gov’t & Oppos 305; S Severinghaus, ‘Mongolia in 2000: The Pendulum Swings Again’ (2001) 41 Asian Surv 61; D Collier, ‘The Ideal Pendulum Swing: From Rhetoric to Reality’ (2008) 13 BJCL 175. 3G Miller, ‘Watching the Correctional Pendulum Swing’ (1993) 62 FBI Law Enforcement Bulletin 24; D Spader, ‘Megatrends in Criminal Justice Theory’ (1985–1986) 13 AJCL 157; D Collier, ‘The Ideal Pendulum Swing: From Rhetoric to Reality’ (2008) 13 BJCL 175; K Parker, ‘Coddling Not Allowed’ © 2014 Taylor & Francis Information & Communications Technology Law 193 reforms,4 the metaphor of the pendulum has been utilised by many to demonstrate how public opinion regarding the balance between security and surveillance has tended to see– saw at various points in history.5 The logic underlying this theory is that in times of crisis, the government may curtail civil liberties in order to protect national security. Etzioni has commented that once the threat has passed, the intrusive measures ‘can gradually be rolled back.’6 While this understanding of the balance between the powers of the State and the protection of civil liberties may place undue faith in the ability of societal forces to correct the excesses of its government systems over time, it can be useful to illustrate observable shifts in public opinion and subsequent developments in government policy. Due to the secrecy of surveillance systems, the public often only learns of the true nature of government activity following the actions of a whistle-blower, like Edward Snowden. Due to this information deficit, the pendulum is only prone to swing back in favour of greater protection of privacy rights once the relevant information enters the public domain. Often, the importance of privacy is weighed against the importance of national security. This balancing can place an undue burden on the right to privacy, as a threat to privacy appears remote in comparison to a threat to personal safety. Privacy, as a fundamental right, has faced criticisms of varying degrees of severity. At the more moderate end of the scale, Hixon has described privacy as being a right worth protecting, but not worth pro- tecting ‘on the grand scale that claims for privacy are pressed today.’7 More negatively, privacy has been described as a ‘cult’ that ‘rests on an individualist conception of society.’8 In popular discourse, privacy is often wholly identified as a benefit to the individ- ual, weighing against general social goods, such as security.9 Despite the vigorous protesta- tions of civil liberties organisations a frequently made argument is that privacy is a moribund right that people no longer need and is, in fact, an anachronistic value in modern life.10 Predictably, the argument goes, in the war on terror and organised crime, privacy is even less important. Popular culture is infected with an ‘us v. them’ mentality Chicago Tribune (Chicago, 24 November 1999) <articles.chicagotribune.com/1999–11-24/news/ 9911240048_1_discipline-psychotropic-greater-communication-and-education> accessed 10 October 2014. 4P Wolfe and L Poynor, ‘Politics and the Pendulum: An Alternative Understanding of the Case of Whole Language as Educational Innovation’ (2001) 30 Educational Researcher 15–20; C Mellon, ‘Technology and the Great Pendulum of Education’ (1999) 32 JRCE 28; D Coulby, R Cowen and C Jone, Education in Times of Transition (Psychology Press, 2000). 5D Clarke and E Neveleff, ‘Secrecy, Foreign Intelligence, and Civil Liberties: Has the Pendulum Downloaded by [Maynooth University Library] at 08:41 24 October 2017 Swung Too Far?’ (1984) 99 PSQ 493; P Pillar, ‘The Pendulum of Opinion on Security and Privacy’ The National Interest (11 June 2013) <www.brookings.edu/research/opinions/2013/06/09- security-privacy-surveillance-phone-internet-terrorism-pillar> accessed 10 October 2014; O Kerr, ‘Technology, Privacy, and the Courts: A Reply to Colb and Swire’ 102 Mich L Rev 933; R Matthew and G Shambaugh, ‘The Pendulum Effect: Explaining Shifts in the Democratic Response to Terrorism’ (2005) 5 Analyses of Social Issues and Public Policy 223; D Solove, ‘Data Mining and the Security-Liberty Debate’ (2008) 75 U Chi L Rev 343. 6A Etzioni, The Limits of Privacy 25 (Basic Books, 1999) 25; See D Solove, Nothing to Hide: The False Trade-off between Privacy and Security (Yale University Press, 2011) 55–56. 7G Laurie, Genetic Privacy: A Challenge to Medico-legal Norms (CUP, 2002) 47. R Hixson, Privacy in a Public Society (OUP, 1987) 4. 8H Arndt, ‘The Cult of Privacy’ (1949) 21 AQ 68, 70–71; S Benn, ‘Privacy, Freedom, and Respect for Persons’ in F Schoeman (ed), Philosophical Dimensions of Privacy (CUP, 1984) 303. 9See D Solove, Understanding Privacy (Harvard University Press, 2008) 10. 10J Rule, Privacy in Peril (OUP, 2007) xi. 194 M.H. Murphy where the idea of protecting privacy rights is viewed by many as abhorrent pandering to terrorists and criminals.11 Such complacency is occasionally checked, however. Often this task is performed by the press, such as when the News of the World phone hacking scandal was exposed.12 When reports emerged exposing the phone hacking of celebrities, politicians, and members of the Royal Family, there was mild public interest.13 When the recognisable and relatable figure of Millie Dowler and her family became part of the story, however, the increased level of outrage was palpable.14 Revelations like this make people stop and think, turn the intangible into the material and remind people that privacy is a right worth protecting. This article considers how non-voluntary transparency has influenced sur- veillance policy in the past by examining the aftermath of the Watergate scandal and the Bush administration warrantless wiretapping scandal. The Edward Snowden revelations have, once again, brought the question of privacy to the fore of public consciousness. By refusing to view this latest scandal in isolation, this article gains insight from previous experiences. This article considers the effect of the Snowden revelations on public opinion and assesses the implications of the disclosures from the European perspective. Transparency is highlighted as a crucial regulating force on excessive government interfer- ence with privacy rights. Watergate and the Church Committee During the Cold War, public anxiety was high and the threat posed by the Soviet Union was keenly felt. With the Cold War being waged through technological and political compe- tition, the importance of espionage and the fear of foreign spies rose.15 This environment enabled the rapid expansion of the powers and capabilities of government investigative agencies.16 In spite of the fact that public perception tends to associate the abuses exposed following the Watergate scandal solely with the Nixon administration, such a 11C Gearty,
Recommended publications
  • D1.5 Final Business Models
    ITEA 2 Project 10014 EASI-CLOUDS - Extended Architecture and Service Infrastructure for Cloud-Aware Software Deliverable D1.5 – Final Business Models for EASI-CLOUDS Task 1.3: Business model(s) for the EASI-CLOUDS eco-system Editor: Atos, Gearshift Security public Version 1.0 Melanie Jekal, Alexander Krebs, Markku Authors Nurmela, Juhana Peltonen, Florian Röhr, Jan-Frédéric Plogmeier, Jörn Altmann, (alphabetically) Maurice Gagnaire, Mario Lopez-Ramos Pages 95 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Abstract The purpose of the business working group within the EASI-CLOUDS project is to investigate the commercial potential of the EASI-CLOUDS platform, and the brokerage and federation- based business models that it would help to enable. Our described approach is both ‘top down’ and ‘bottom up’; we begin by summarizing existing studies on the cloud market, and review how the EASI-CLOUDS project partners are positioned on the cloud value chain. We review emerging trends, concepts, business models and value drivers in the cloud market, and present results from a survey targeted at top cloud bloggers and cloud professionals. We then review how the EASI-CLOUDS infrastructure components create value both directly and by facilitating brokerage and federation. We then examine how cloud market opportunities can be grasped through different business models. Specifically, we examine value creation and value capture in different generic business models that may benefit from the EASI-CLOUDS infrastructure. We conclude by providing recommendations on how the different EASI-CLOUDS demonstrators may be commercialized through different business models. © EASI-CLOUDS Consortium. 2 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Table of contents Table of contents ...........................................................................................................................
    [Show full text]
  • Almost Gone: the Vanishing Fourth Amendment's Allowance Of
    GEE- TO PRINT (DO NOT DELETE) 5/21/2019 4:05 PM ALMOST GONE: THE VANISHING FOURTH AMENDMENT’S ALLOWANCE OF STINGRAY SURVEILLANCE IN A POST-CARPENTER AGE HARVEY GEE* TABLE OF CONTENTS I. FOURTH AMENDMENT JURISPRUDENCE AND THE LACK OF POLICE ACCOUNTABILITY IN TRAFFIC STOPS .......... 412 II. BEYOND TERRY V. OHIO: FROM ONE-ON-ONE ENCOUNTERS TO PROACTIVE LARGE-SCALE STOP AND FRISKS ON THE STREETS WITHIN A POLICE STATE ......................................................................................... 417 III. DIGITAL UPGRADE: SURVEILLANCE STATE TECHNOLOGY AND REFRAMING THE SUPREME COURT’S FOURTH AMENDMENT JURISPRUDENCE ........ 420 A. CARPENTER V. UNITED STATES: POSITIONING A RESILIENT FOURTH AMENDMENT ON A PRO-PRIVACY TRAJECTORY IN THE DIGITAL AGE ............................................................. 423 IV. PRIVACY AND THE FOURTH AMENDMENT AFTER CARPENTER: ARGUING AGAINST THE UNCONSTITUTIONAL USE OF STINGRAY SURVEILLANCE TECHNOLOGY ........................................... 430 * The author is an attorney in San Francisco. He previously served as an Attorney with the Office of the Federal Public Defender in Las Vegas and Pittsburgh, the Federal Defenders of the Middle District of Georgia, and the Office of the Colorado State Public Defender. LL.M, The George Washington University Law School; J.D., St. Mary’s School of Law; B.A., Sonoma State University. The author thanks Taylor Francis, Elvira Razzano, Austin Smith, and the Southern California Review of Law and Social Justice for their assistance and hard work in the preparation of this article. 409 410 REVIEW OF LAW AND SOCIAL JUSTICE [Vol. 28:3 A. THE SECRET USE OF STINGRAY SURVEILLANCE TECHNOLOGY BY LAW ENFORCEMENT ................................ 431 B. CALLS FOR A WARRANT REQUIREMENT FOR THE USE OF STINGRAY CELL-SITE SIMULATORS FROM LEGAL SCHOLARS ............................................................................
    [Show full text]
  • Comment Submitted by David Crawley Comment View Document
    Comment Submitted by David Crawley Comment View document: The notion that my social media identifier should have anything to do with entering the country is a shockingly Nazi like rule. The only thing that this could facilitate anyway is trial by association - something that is known to ensnare innocent people, and not work. What is more this type of thing is repugnant to a free society. The fact that it is optional doesn't help - as we know that this "optional" thing will soon become not-optional. If your intent was to keep it optional - why even bother? Most importantly the rules that we adopt will tend to get adopted by other countries and frankly I don't trust China, India, Turkey or even France all countries that I regularly travel to from the US with this information. We instead should be a beacon for freedom - and we fail in our duty when we try this sort of thing. Asking for social media identifier should not be allowed here or anywhere. Comment Submitted by David Cain Comment View document: I am firmly OPPOSED to the inclusion of a request - even a voluntary one - for social media profiles on the I-94 form. The government should NOT be allowed to dip into users' social media activity, absent probable cause to suspect a crime has been committed. Bad actors are not likely to honor the request. Honest citizens are likely to fill it in out of inertia. This means that the pool of data that is built and retained will serve as a fishing pond for a government looking to control and exploit regular citizens.
    [Show full text]
  • Online Anonymity Islamic State and Surveillance
    online anonymity islamic state and surveillance Jamie Bartlett Alex Krasodomski-Jones March 2015 Open Access. Some rights reserved. As the publisher of this work, Demos wants to encourage the circulation of our work as widely as possible while retaining the copyright. We therefore have an open access policy which enables anyone to access our content online without charge. Anyone can download, save, perform or distribute this work in any format, including translation, without written permission. This is subject to the terms of the Demos licence found at the back of this publication. Its main conditions are: . Demos and the author(s) are credited . This summary and the address www.demos.co.uk are displayed . The text is not altered and is used in full . The work is not resold . A copy of the work or link to its use online is sent to Demos. You are welcome to ask for permission to use this work for purposes other than those covered by the licence. Demos gratefully acknowledges the work of Creative Commons in inspiring our approach to copyright. To find out more go to www.creativecommons.org Partners Credits Commissioned by? Published by Demos March 2015 © Demos. Some rights reserved. Third Floor Magdalen House 136 Tooley Street London SE1 2TU [email protected] www.demos.co.uk 2 INTRODUCTION This is a very short discussion paper about the way in which terrorist groups, and specifically Islamic State, use modern encryption systems to evade surveillance. It examines how the risks of online anonymity are weighed against its many social, personal and economic benefits.
    [Show full text]
  • Legal Responses and Countermeasures to National Security Letters
    Washington University Journal of Law & Policy Volume 47 Intellectual Property: From Biodiversity to Technical Standards 2015 Legal Responses and Countermeasures to National Security Letters Brett Weinstein Washington University School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_journal_law_policy Part of the National Security Law Commons Recommended Citation Brett Weinstein, Legal Responses and Countermeasures to National Security Letters, 47 WASH. U. J. L. & POL’Y 217 (2015), https://openscholarship.wustl.edu/law_journal_law_policy/vol47/iss1/15 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Journal of Law & Policy by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Legal Responses and Countermeasures to National Security Letters Brett Weinstein INTRODUCTION In early June of 2013, governmental surveillance suddenly and dramatically entered the public consciousness, prompting a torrent of debate and backlash. The Guardian published a top secret court order requiring Verizon to hand over all telephone call records to the National Security Agency (NSA); the Washington Post disclosed a secret but widespread Internet surveillance program, and months of similar revelations followed, all stemming from leaks by former NSA contractor, Edward Snowden.1 As a result, the public and the press began to question the tools that the government uses for surveillance, including National Security Letters (NSLs), and the relationship between the government and the technology and telecommunications companies that seemingly possess all personal and private information generated in the modern, digital world.2 J.D.
    [Show full text]
  • National Insecurity: the Impacts of Illegal Disclosures of Classified Information
    National Insecurity: The Impacts of Illegal Disclosures of Classified Information MARK D. YOUNG* There had never been anything like it. In today's terms, it was as if an NSA employee had publicly revealed the complete communications intelligence operations of the Agency for the past twelve years-all its techniques and major successes, its organizational structure and budget-and had, for good measure, included actual intercepts, decrypts, and translations of the communications not only of our adversaries but of our allies as well.' In the mid-summer of 2013, the British newspaper, The Guardian, published claims by a contractor for the National Security Agency (NSA), that millions of telephone records were being collected under an order from the Foreign Intelligence Surveillance Court. Throughout the summer and fall, additional disclosures about apparent surveillance operations seized headlines around the world. Accurately interpreting the meaning of the disclosures has been more complicated, but it is clear that there is great public interest in United States intelligence activities. *Mark D. Young is the Senior Vice President and Chief Strategy Officer of National Security Partners, LLC. Previously he served as the Executive Director for the Directorate of Plans and Policy at United States Cyber Command, the Special Counsel for Defense Intelligence for the House Permanent Select Committee on Intelligence, and as a senior leader at the National Security Agency. The views expressed in this article are those of the author and do not reflect the official policy or position of the U.S. government. This article is derived entirely from open source material and contains no classified information.
    [Show full text]
  • P27 Layout 1
    WEDNESDAY, JANUARY 22, 2014 technology Carphone Warehouse sales get 4G boost LONDON: Carphone Warehouse, and Vodafone started services in within the market,” he said, noting that of growth of 2 percent and second quar- ance for headline earnings per share of Europe’s biggest independent mobile August last year. growing penetration of 4G was also driv- ter like-for-like growth of 3.6 percent. 17-20 pence, up from 12.3 pence in the phone retailer, beat consensus forecasts Take-up of 4G is being driven by rock- ing a rise in incremental average revenue CPW UK like-for-like revenue rose 5 2012-13 year. It also reiterated guidance for third-quarter revenue growth at its eting demand for mobile data. “There is a per user (ARPU). percent during the quarter, building on for pro-forma headline earnings before main CPW Group business, helped by real willingness for customers to move to Shares in Carphone, up over a quarter growth of 16 percent in the same period interest and tax (EBIT) of 140-160 million growing sales of 4G superfast mobile 4G and a willingness for them to under- in the last year, rose 1.4 percent after the last year. The firm said its Virgin Mobile pounds ($230-263 million) for CPW broadband products. stand that data usage is going to go up in firm said sales at CPW Group stores open France joint venture maintained its post- Group. Mobile operator EE, a joint venture the future,” Carphone Chief Executive over a year rose 3.1 percent in the three pay customer base at 1.33 million, Carphone shares were up 3 pence at between Frances’ Orange and Deutsche Andrew Harrison told Reuters yesterday.
    [Show full text]
  • Maintaining Corporate Privacy in the Digital Age
    Maintaining Corporate Privacy in the Digital Age Securing sensitive data while in motion and at rest Introduction Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise mobility initiatives to grow their businesses and increase operating efficiency. However, Ovum is concerned that corporate information security management policies do not appear to be adapting quickly enough to cope with the tumultuous rate of change imposed by the rapidly evolving business and technological landscape. Although encryption has been around for many years, it has come to the fore recently as a means of making it more difficult to gain unauthorized access to sensitive or confidential information, especially within the context of mobile devices. Ovum expects the adoption of encryption technologies to grow rapidly in the near term due to the fact that conventional approaches to information security are failing to stem the flow of data leakage incidents and privacy breaches. Eventually, all data will be encrypted at rest and/or in motion. However, for a variety of technical, practical, and legislative reasons, organizations must be diligent and meticulous in their use of this technology, with the customer and employee experience being of paramount importance. Companies can prioritize the encryption of corporate data by carrying out a data classification exercise across their business processes and IT infrastructure. However, data classification is a resource-intensive and generally costly process. Not only is it time- and resource-consuming to implement a manual classification in the first place, but it also requires employees to be aware of changing classification policies going forward, and to potentially apply them to information and data items that they have already created and distributed.
    [Show full text]
  • Stingray Cell-Site Simulator Surveillance and the Fourth
    St. John's Law Review Volume 93 Number 2 Volume 93, 2019, Number 2 Article 3 Stingray Cell-Site Simulator Surveillance and the Fourth Amendment in the Twenty-First Century: A Review of The Fourth Amendment in an Age of Surveillance, and Unwarranted Harvey Gee Follow this and additional works at: https://scholarship.law.stjohns.edu/lawreview This Article is brought to you for free and open access by the Journals at St. John's Law Scholarship Repository. It has been accepted for inclusion in St. John's Law Review by an authorized editor of St. John's Law Scholarship Repository. For more information, please contact [email protected]. BOOK REVIEW STINGRAY CELL-SITE SIMULATOR SURVEILLANCE AND THE FOURTH AMENDMENT IN THE TWENTY-FIRST CENTURY: A REVIEW OF THE FOURTH AMENDMENT IN AN AGE OF SURVEILLANCE, AND UNWARRANTED BARRY FRIEDMAN, UNWARRANTED: POLICING WITHOUT PERMISSION, NEW YORK: FARRAR, STRAUSS AND GIROUX, 2017. PP. 434. DAVID GRAY, THE FOURTH AMENDMENT IN AN AGE OF SURVEILLANCE, NEW YORK: CAMBRIDGE UNIVERSITY PRESS, 2017. PP. 305. HARVEY GEE† INTRODUCTION The police can secretly track your every physical movement, listen to your private conversations, and collect data from your cell phone—all without first getting a warrant based on probable cause, signed off by a judge. “WTF?!” you text. Indeed, this practice by law enforcement using portable Stingray cell-site simulators as digital surveillance tools has also raised the eyebrows of privacy advocates and state and federal courts across the country in the past few years. † The author is an attorney in San Francisco. He previously served as an attorney with the Office of the Federal Public Defender in Las Vegas and Pittsburgh, the Federal Defenders of the Middle District of Georgia, and the Office of the Colorado State Public Defender.
    [Show full text]
  • Last Call for the Third Party Doctrine in the Digital Age After Carpenter?
    GEE_5.16.20_FINAL (DO NOT DELETE) 8/22/2020 12:42 PM ARTICLE LAST CALL FOR THE THIRD-PARTY DOCTRINE IN THE DIGITAL AGE AFTER CARPENTER? HARVEY GEE† INTRODUCTION ............................................................................................... 287 I. FROM MILLER AND SMITH TO CARPENTER: THE ORIGINS AND DEVELOPMENT OF THE THIRD-PARTY DOCTRINE ........................................................ 290 II. DEPARTING FROM SMITH AND MILLER: CARPENTER DIGITIZES THE KATZ REASONABLE EXPECTATION OF PRIVACY TEST .................................. 297 III. AFTER CARPENTER: ARGUING FOR A WARRANT REQUIREMENT FOR HISTORICAL AND REAL-TIME CLSI, THE THIRD-PARTY DOCTRINE IS NOT APPLICABLE TO REAL-TIME CELL PHONE MONITORING, AND THE THREAT OF FACIAL RECOGNITION SURVEILLANCE TECHNOLOGY ..... 300 A. Arguing for a Warrant Requirement for Real-Time CLSI .............. 302 B. The Third-Party Doctrine is Not Applicable to Real-Time Cell phone Monitoring ................................................................................... 310 C. The Threat of Facial Recognition Surveillance Technology and the Need for Regulation ..................................................................... 315 CONCLUSION ................................................................................................... 323 † The author is an attorney in San Francisco. He previously served as an attorney with the Office of the Federal Public Defender in Las Vegas and Pittsburgh, the Federal Defenders of the Middle District of Georgia, and the Office of the Colo-
    [Show full text]
  • Reframing the Crypto Wars
    CONTENTS Introduction 1 A Highlights Reel of the U.S. Encryption Debate 2 The Early “Crypto Wars” and the Clipper Chip 2 The Encryption Debate Sequel: Snowden and Surveillance 3 Privacy and the Encryption Debate 3 Earn It: Encryption Controversy Over Section 230 3 The Current International Debate Around Encryption 4 The Impact of International Encryption Policy on Domestic Policy 5 Security Versus Privacy or Security Versus Security 5 Challenges to Making Progress on the Encryption Debate 6 The Increased Availability of User-friendly Encryption Services 6 A Lack of a Common Language 6 A Lack of a Whole of Government Approach to Cybersecurity 7 Disagreement About Backdoor Alternatives 8 Conclusion 9 About the Authors 10 R STREET POLICY STUDY NO. 237 The debate was seemingly set to be answered by the courts in July 2021 2016, when Apple refused to craft new software at the behest of the Federal Bureau of Investigation (FBI) that would allow the agency to access encrypted information on a phone belonging to one of the shooters in a 2015 terrorist attack on Inland Regional Center in San Bernardino, California. REFRAMING THE CRYPTO WARS But the “going dark” encryption debate shares a key charac- By Kathryn Waldron and Sofia Lesmes teristic with the walking dead: no matter how many times you try to put it to rest, it keeps coming back. In October 2020, the Department of Justice (DOJ) issued an international INTRODUCTION statement calling for companies to “[e]nable law enforce- ment access to content in a readable and usable format where or the past several decades, policymakers, law enforce- authorisation is lawfully issued, is necessary and proportion- ment, private companies, civil liberties advocates and ate, and is subject to strong safeguards and oversight.”2 Both cybersecurity specialists have been locked in a pas- at home and abroad, there are increased government calls to sionate yet seemingly unending battle over encryp- weaken encryption in the name of national security.
    [Show full text]
  • Navigating the Digital Age: the Definitive Cybersecurity Guide For
    THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS NAVIGATING THE DIGITAL AGE: The Defi nitive Cybersecurity Guide for Directors and Offi cers Published by Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers Publisher: Tim Dempsey Editor: Matt Rosenquist Design and Composition: Graphic World, Inc. Printing and Binding: Transcontinental Printing Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers is published by: Caxton Business & Legal, Inc. 27 North Wacker Drive, Suite 601 Chicago, IL 60606 Phone: +1 312 361 0821 Email: [email protected] First published: 2015 ISBN: 978-0-9964982-0-3 Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers © October 2015 Cover illustration by Tim Heraldo Copyright in individual chapters rests with the authors. No photocopying: copyright licenses do not apply. DISCLAIMER Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers (the Guide) contains summary information about legal and regulatory aspects of cybersecurity governance and is current as of the date of its initial publication (October 2015). Although the Guide may be revised and updated at some time in the future, the publishers and authors do not have a duty to update the information contained in the Guide, and will not be liable for any failure to update such information. The publishers and authors make no representation as to the completeness or accuracy of any information contained in the Guide. This guide is written as a general guide only. It should not be relied upon as a substitute for specifi c professional advice.
    [Show full text]