Beyond Snowden by Timothy H. Edgar
Author:Timothy H. Edgar
Language: eng
Format: epub
Publisher: Brookings Institution Press
IF WORD GAMES ARE MY specialty, Anna is usually more interested in math. When it comes to privacy, my marriage is a special case of “West Coast Code” meets “East Coast Code.” The idea, popularized by Larry Lessig, is that technology can define the rules that guide our lives as much as—and sometimes more than—law. East Coast Code is law—the U.S. Code and other regulations and rules made in Washington, D.C. West Coast Code is computer code—the software, protocols, and standards most famously written in Silicon Valley.13
The East Coast Code idea of privacy originates in a paper by Louis Brandeis and his law partner, Samuel Warren, published in the Harvard Law Review in 1890. In “The Right to Privacy,” Warren and Brandeis argue that invasions of privacy require a legal remedy, just as the law provides a remedy for physical harms. When Brandeis later became a Supreme Court justice, he continued to champion privacy in other contexts, including in the context of what was then a new form of surveillance, wiretapping. In Olmstead v. United States, the Supreme Court’s majority found the government needed no search warrant to engage in wiretapping of a telephone line on a public street, focusing on the fact that there was no physical intrusion into the suspect’s home, only an intangible invasion of his privacy. In one of his famous dissents, Brandeis protested that wiretapping was no less a search for being intangible. He wrote that “every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.” In 1967 the Supreme Court repudiated the narrow approach to surveillance it had taken in Olmstead, vindicating Brandeis’s dissent.14
Eloquence aside, there is a wiggle word in Brandeis’s definition of privacy. It is only unjustifiable intrusions that violate the Fourth Amendment. Lawyers like wiggle words. It gives them power because lawyers and judges are the ones that say what the words mean. Intelligence officials often look to their lawyers to figure out creative ways they can get the data they need—or think they need—without violating the rules. When the Justice Department was seeking to justify the NSA’s bulk collection of telephone records under the Patriot Act, its lawyers praised the FISA court’s opinions approving bulk collection of internet metadata as “ground breaking and innovative.”15 As we have seen, that program of domestic bulk collection turned out not to have been particularly valuable. When lawyers think in innovative ways, the results can be bad for privacy.
The West Coast Code idea of privacy offers no wiggle room. It is perhaps best captured in a paper written by three computer scientists at the Massachusetts Institute of Technology, Ron Rivest, Adi Shamir, and Len Adelman. The paper outlines the first practical system of public key cryptography, the “RSA algorithm,” its name incorporating the initials of its inventors. Public key cryptography solves the problem of how to encrypt communications without the need to agree on a key ahead of time.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Anthropology | Archaeology |
Philosophy | Politics & Government |
Social Sciences | Sociology |
Women's Studies |
The Secret History by Donna Tartt(18259)
The Social Justice Warrior Handbook by Lisa De Pasquale(11967)
Thirteen Reasons Why by Jay Asher(8487)
This Is How You Lose Her by Junot Diaz(6469)
Weapons of Math Destruction by Cathy O'Neil(5869)
Zero to One by Peter Thiel(5514)
Beartown by Fredrik Backman(5376)
The Myth of the Strong Leader by Archie Brown(5252)
The Fire Next Time by James Baldwin(5037)
How Democracies Die by Steven Levitsky & Daniel Ziblatt(4975)
Promise Me, Dad by Joe Biden(4918)
Stone's Rules by Roger Stone(4877)
100 Deadly Skills by Clint Emerson(4710)
A Higher Loyalty: Truth, Lies, and Leadership by James Comey(4570)
Rise and Kill First by Ronen Bergman(4557)
Secrecy World by Jake Bernstein(4415)
The David Icke Guide to the Global Conspiracy (and how to end it) by David Icke(4410)
The Farm by Tom Rob Smith(4338)
The Doomsday Machine by Daniel Ellsberg(4258)
