Privacy in an Age of Cybersurveillance

  • Weaver Russell L.
doi: 10.53116/pgaflr.7116

Abstract

This article provides an update en events since Edward Snowden, an employee of a National Security Agency (NSA) contractor, stole and released thousands of classified documents in 2013, revealing that the U.S. government was engaged in a massive secret cybersurveilance operation that was amassing information about people all over the world, including U.S. citizens. In the U.S., Snowden’s revelations sparked a spirited debate regarding privacy rights, and in particular whether the U.S. cybersurveillance operation was appropriate in a democratic system. This article describes the scope of the cybersuveillance program, and examines how the courts and Congress responded to the Snowden revelations, and (in particular) how U.S. society evolved in the following years.

Keywords:

privacy secrecy FISA terrorism FISC cybersurveillance search and seizure Bill of Rights reasonable expectation of privacy Fourth Amendment

How to Cite

Weaver, R. L. (2024). Privacy in an Age of Cybersurveillance. Public Governance, Administration and Finances Law Review, 9(1), 21–35. https://doi.org/10.53116/pgaflr.7116

References

Adair, D. (1957). “That Politics May Be Reduced to a Science”: David Hume, James Madison and the Tenth Federalist. The Huntington Library Quarterly, 20(4), 343–360. Online: https://doi.org/10.2307/3816276

Angwin, J., Savage, C., Larson, J., Moltke, H., Poitras, L. & Risen, J. (2015, August 15). AT&T Helped U.S. Spy on Internet on a Vast Scale. The New York Times. Online: https://shorturl.at/qN027

Bailyn, B. (1967). The Ideological Origins of the American Revolution. Belknap Press.

Bailyn, B. (Ed.) (1993). The Debate on the Constitution: Federalist and Antifederalist Speeches, Articles, and Letters During the Struggle over Ratification. Part One: September 1787 – February 1788. Library of America.

Baker, P. (2014, January 15). Obama’s Path from Critic to Overseer of Spying. The New York Times. Online: https://shorturl.at/dfgMP

Beeman, R. (Ed.) (2012). The Federalist Papers. Penguin Books.

Berman, E. (2018). Digital Searches, the Fourth Amendment, and the Magistrates’ Revolt. Emory Law Journal, 68(1), 49–94. Online: https://scholarlycommons.law.emory.edu/elj/vol68/iss1/2

Calmes, J. & Wingfield, N. (2013, December 17). Tech Leaders and Obama Find Shared Problem: Fading Public Trust. The New York Times. Online: https://shorturl.at/mtJL8

Carlson, J. D., Goodale, G. M., Quinlan, G. C., Suarez, S. L., Meyer, J. M., McHugh, R., Petty, K. A. & Weinstein, B. H. (2016). National Security Law. The Year in Review. An Annual Publication of the ABA/Section of International Law, 51, 497–513. Online: https://shorturl.at/ostJU

Castle, S. (2013, December 25). TV Message by Snowden Says Privacy Still Matters. The New York Times. Online: https://shorturl.at/ghJL6

Cole, D. (2015, May 6). Here’s What’s Wrong with the USA Freedom Act. The Nation. Online: https://shorturl.at/qrL35

Dallal, R. (2018). Speak No Evil: National Security Letters, Gag Orders, and the First Amendment. Berkeley Technology Law Journal, 33(4), 1115–1146. Online: https://doi.org/10.15779/Z388911R16

Doernberg, D. L. (1985). “We the People”: John Locke, Collective Constitutional Rights, and Standing to Challenge Government Action. California Law Review, 73(1), 52–118. Online: https://shorturl.at/qARSY

Electronic Frontier Foundation (EFF) (s. a.). National Security Letters. Online: https://shorturl.at/dehG4

Gellman, B. & Soltani, A. (2013, October 30). NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. The Washington Post. Online: https://shorturl.at/aDFJL

Guariglia, M. & Mackey, A. (2022, August 22). Victory: Government Finally Releases Secretive Court Rulings Sought by EFF. Electronic Frontier Foundation. Online: https://shorturl.at/mIOR8

Hasan, M. (2015, November 30). Why I Miss George W. Bush. The New York Times. Online: https://shorturl.at/glpT0

Ketcham, R. (Ed.) (1986). The Anti-Federalist Papers and the Constitutional Convention Debates. New American Library.

Konig, D. (2008). Thomas Jefferson’s Armed Citizenry and the Republican Militia. Albany Government Law Review, 1, 250–291.

Maass, P. (2013, August 13). How Laura Poitras Helped Snowden Spill His Secrets. The New York Times. Online: https://shorturl.at/aoxQ2

Mazzetti, M. & Schmidt, M. S. (2013, June 9). Ex-Worker at C.I.A. Says He Leaked Data on Surveillance. The New York Times. Online: https://shorturl.at/qwC28

Mendoza, M. (2013, November 21). Reagan Order Led to NSA’s Broader Spying. The Ithaca Journal.

Montesquieu, Baron de, C. (2011). The Spirit of Laws. Cosimo Classics.

Myers, S. L. & Kramer, A. E. (2013, August 1). Defiant Russia Grants Snowden Year’s Asylum. The New York Times. Online: https://shorturl.at/fuzW6

Paine, T. (1997). Common Sense. Dover Publications.

Risen, J. & Wingfield, N. (2013, June 19). Web’s Reach Binds N.S.A. and Silicon Valley Leaders. The New York Times. Online: https://shorturl.at/nCDMR

Rosenthal, A. (2013, October 24). Clapper and Carney Get Slippery on Surveillance. The New York Times. Online: https://shorturl.at/owJP4

Rubin, A. J. (2013, October 21). French Condemn Surveillance by N.S.A. The New York Times. Online: https://shorturl.at/dhAFG

Savage, C. & Mazzetti, M. (2013, June 10). Cryptic Overtures and a Clandestine Meeting Gave Birth to a Blockbuster Story. The New York Times. Online: https://shorturl.at/dgkGT

Savage, C. & Shane, S. (2013, June 17). N.S.A. Leaker Denies Giving Secrets to China. The New York Times. Online: https://shorturl.at/evB69

Shane, S. (2013a, June 20). Documents Detail Restrictions on N.S.A. Surveillance. The New York Times. Online: https://shorturl.at/yPZ23

Shane, S. (2013b, November 2). No Morsel Too Minuscule for All-Consuming N.S.A. The New York Times. Online: https://shorturl.at/jmyB1

Shane, S. & Sanger, D. E. (2013, June 30). Job Title Key to Inner Access Held by Leaker. The New York Times. Online: https://shorturl.at/cdk08

Shear, M. D. (2015, June 4). Limits Reshape Terror Laws, and Obama’s Legacy: News Analysis. International New York Times.

Shoenberger, A. E. (2010). Connecticut Yankee in Europe’s Court: An Alternative Vision of Constitutional Defamation Law to New York Times v. Sullivan? Quinnipiac University Law Review, 28, 431–489. Online: https://shorturl.at/ejkqQ

Smale, A. (2013, October 23). Anger Growing among Allies on U.S. Spying. The New York Times. Online: https://shorturl.at/AG249

Stanglin, D. (2013, July 31). Report: Snowden Says NSA Can Tap E-Mail, Facebook Chats. USA Today. Online: https://shorturl.at/cioDT

Steinhauer, J. & Weisman, J. (2015, June 4). Surveillance in Place Since 2001 is Cut Back Sharply; New Legislation Curtails Sweeping Monitoring of American Phone Records. International New York Times.

The Editorial Board of the New York Times (2014, January 1). Edward Snowden, Whistle-Blower. The New York Times. Online: https://shorturl.at/fBFG2

Turner, S. (2018). The Secrets of the Secret Court: An Analysis of the Missing Party and Oversight of the Foreign Intelligence Surveillance Court. Administrative Law Review, 70(4), 991–1019. Online: https://shorturl.at/fgtxT

Warren, S. D. & Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193–220. Online: https://doi.org/10.2307/1321160

Weaver, R. L. (2011). The James Otis Lecture: The Fourth Amendment, Privacy and Advancing Technology. Mississippi Law Journal, 80, 1131–1227.

Weaver, R. L. (2019). From Gutenberg to the Internet. Free Speech, Advancing Technology, and the Implications for Democracy. (2nd edition) Carolina Academic Press.

Weaver, R. L., Burkoff, J. M., Hancock, C. & Friedland, S. I. (2021). Principles of Criminal Procedure. (7th edition) West Academic.

Downloads

Download data is not yet available.