- Journal Archives
- Volume 17
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
By now you’ve undoubtedly heard about the National Security Agency’s collection and monitoring of billions of Americans’ phone records and internet activity from nine of the largest US internet service providers in attempts to root out terrorism. Ever since the story was reported in The Guardian, the program has been met with outrage from legislators and the public alike. Rand Paul, one of the most vocal critics, has called it an “extraordinary invasion of privacy” and “an assault on the Constitution.” Paul has even floated the possibility of challenging the program in the Supreme Court. The Obama administration has defended the program as a balancing act, saying the public “can’t have 100 percent security and 100 percent privacy and zero inconvenience.” National Director of Intelligence James Clapper has said that the program directly helped in foiling two well-publicized terror plots in 2009.
This disclosure brought several legal questions to the forefront of public discussion. First and foremost, what, if any, kind of prosecution is the 29-year-old contractor responsible for the disclosure going to face? He claims his motives were not to harm national security in any way. He says he was motivated simply by the belief that the public deserved to know the breadth of this program. He’s currently in Hong Kong, hiding in fear of extradition to the United States. The potential prosecution raises a few key issues. Some have speculated that the government could be wary to prosecute, fearing further disclosure of government secrets at trial and potential public sentiment in favor of the whistle-blower.
These disclosures have also stoked discussion on how exactly the NSA was able to carry out the program. The sheer quantity of data originally made it impossible for the agency to sift through it effectively. But that was before the explosion of software advances aimed at managing “big data.” To deal with its “big data,” the NSA adopted a software program (originally developed by Yahoo!) called “Hadoop.” Companies like Twitter and Facebook also use the technology. The NSA used Hadoop to analyze the massive amount of data collected and to spread the task over hundreds of computers, essentially eliminating the need for a huge supercomputer for analysis. One former US official claims the program allows the NSA to successful predict attacks 60 to 70% of the time. These technological advances are helping to satisfy Americans’ growing demand to access the internet and social media, but, as we can see, they also raise very serious privacy concerns.
President Obama claims that we cannot have 100 percent security and 100 percent privacy. Therefore, the question we must answer is: Where should the balance be struck?
Image Source: Scott Beale / Laughing Squid
Recent Blog Posts
- Cyber Security Bill Passes Senate in Landslide Vote
- Anonymous Declares Cyber War on ISIS
- Taming the Wild, Wild (Internet): Yik Yak posting leads law enforcement to arrest in University of Missouri campus threat incident
- Epigenetics – The Missing Causal Nexus – An Analogy through PTSD
- Digital Asset Forfeiture: Dispensation of Cryptocurrency in Appropriated in Connection with the Proseuction of Silk Road
- “A Rape on Campus” = $25 million Defamation Lawsuit for Rolling Stone
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution