Privacy in an Age of Cybersurveillance

  • Weaver Russell L.
doi: 10.53116/pgaflr.7116


This article provides an update en events since Edward Snowden, an employee of a National Security Agency (NSA) contractor, stole and released thousands of classified documents in 2013, revealing that the U.S. government was engaged in a massive secret cybersurveilance operation that was amassing information about people all over the world, including U.S. citizens. In the U.S., Snowden’s revelations sparked a spirited debate regarding privacy rights, and in particular whether the U.S. cybersurveillance operation was appropriate in a democratic system. This article describes the scope of the cybersuveillance program, and examines how the courts and Congress responded to the Snowden revelations, and (in particular) how U.S. society evolved in the following years.


privacy secrecy FISA terrorism FISC cybersurveillance search and seizure Bill of Rights reasonable expectation of privacy Fourth Amendment

How to Cite

Weaver, R. L. (2024). Privacy in an Age of Cybersurveillance. Public Governance, Administration and Finances Law Review, 9(1), 21–35.


Adair, D. (1957). “That Politics May Be Reduced to a Science”: David Hume, James Madison and the Tenth Federalist. The Huntington Library Quarterly, 20(4), 343–360. Online:

Angwin, J., Savage, C., Larson, J., Moltke, H., Poitras, L. & Risen, J. (2015, August 15). AT&T Helped U.S. Spy on Internet on a Vast Scale. The New York Times. Online:

Bailyn, B. (1967). The Ideological Origins of the American Revolution. Belknap Press.

Bailyn, B. (Ed.) (1993). The Debate on the Constitution: Federalist and Antifederalist Speeches, Articles, and Letters During the Struggle over Ratification. Part One: September 1787 – February 1788. Library of America.

Baker, P. (2014, January 15). Obama’s Path from Critic to Overseer of Spying. The New York Times. Online:

Beeman, R. (Ed.) (2012). The Federalist Papers. Penguin Books.

Berman, E. (2018). Digital Searches, the Fourth Amendment, and the Magistrates’ Revolt. Emory Law Journal, 68(1), 49–94. Online:

Calmes, J. & Wingfield, N. (2013, December 17). Tech Leaders and Obama Find Shared Problem: Fading Public Trust. The New York Times. Online:

Carlson, J. D., Goodale, G. M., Quinlan, G. C., Suarez, S. L., Meyer, J. M., McHugh, R., Petty, K. A. & Weinstein, B. H. (2016). National Security Law. The Year in Review. An Annual Publication of the ABA/Section of International Law, 51, 497–513. Online:

Castle, S. (2013, December 25). TV Message by Snowden Says Privacy Still Matters. The New York Times. Online:

Cole, D. (2015, May 6). Here’s What’s Wrong with the USA Freedom Act. The Nation. Online:

Dallal, R. (2018). Speak No Evil: National Security Letters, Gag Orders, and the First Amendment. Berkeley Technology Law Journal, 33(4), 1115–1146. Online:

Doernberg, D. L. (1985). “We the People”: John Locke, Collective Constitutional Rights, and Standing to Challenge Government Action. California Law Review, 73(1), 52–118. Online:

Electronic Frontier Foundation (EFF) (s. a.). National Security Letters. Online:

Gellman, B. & Soltani, A. (2013, October 30). NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. The Washington Post. Online:

Guariglia, M. & Mackey, A. (2022, August 22). Victory: Government Finally Releases Secretive Court Rulings Sought by EFF. Electronic Frontier Foundation. Online:

Hasan, M. (2015, November 30). Why I Miss George W. Bush. The New York Times. Online:

Ketcham, R. (Ed.) (1986). The Anti-Federalist Papers and the Constitutional Convention Debates. New American Library.

Konig, D. (2008). Thomas Jefferson’s Armed Citizenry and the Republican Militia. Albany Government Law Review, 1, 250–291.

Maass, P. (2013, August 13). How Laura Poitras Helped Snowden Spill His Secrets. The New York Times. Online:

Mazzetti, M. & Schmidt, M. S. (2013, June 9). Ex-Worker at C.I.A. Says He Leaked Data on Surveillance. The New York Times. Online:

Mendoza, M. (2013, November 21). Reagan Order Led to NSA’s Broader Spying. The Ithaca Journal.

Montesquieu, Baron de, C. (2011). The Spirit of Laws. Cosimo Classics.

Myers, S. L. & Kramer, A. E. (2013, August 1). Defiant Russia Grants Snowden Year’s Asylum. The New York Times. Online:

Paine, T. (1997). Common Sense. Dover Publications.

Risen, J. & Wingfield, N. (2013, June 19). Web’s Reach Binds N.S.A. and Silicon Valley Leaders. The New York Times. Online:

Rosenthal, A. (2013, October 24). Clapper and Carney Get Slippery on Surveillance. The New York Times. Online:

Rubin, A. J. (2013, October 21). French Condemn Surveillance by N.S.A. The New York Times. Online:

Savage, C. & Mazzetti, M. (2013, June 10). Cryptic Overtures and a Clandestine Meeting Gave Birth to a Blockbuster Story. The New York Times. Online:

Savage, C. & Shane, S. (2013, June 17). N.S.A. Leaker Denies Giving Secrets to China. The New York Times. Online:

Shane, S. (2013a, June 20). Documents Detail Restrictions on N.S.A. Surveillance. The New York Times. Online:

Shane, S. (2013b, November 2). No Morsel Too Minuscule for All-Consuming N.S.A. The New York Times. Online:

Shane, S. & Sanger, D. E. (2013, June 30). Job Title Key to Inner Access Held by Leaker. The New York Times. Online:

Shear, M. D. (2015, June 4). Limits Reshape Terror Laws, and Obama’s Legacy: News Analysis. International New York Times.

Shoenberger, A. E. (2010). Connecticut Yankee in Europe’s Court: An Alternative Vision of Constitutional Defamation Law to New York Times v. Sullivan? Quinnipiac University Law Review, 28, 431–489. Online:

Smale, A. (2013, October 23). Anger Growing among Allies on U.S. Spying. The New York Times. Online:

Stanglin, D. (2013, July 31). Report: Snowden Says NSA Can Tap E-Mail, Facebook Chats. USA Today. Online:

Steinhauer, J. & Weisman, J. (2015, June 4). Surveillance in Place Since 2001 is Cut Back Sharply; New Legislation Curtails Sweeping Monitoring of American Phone Records. International New York Times.

The Editorial Board of the New York Times (2014, January 1). Edward Snowden, Whistle-Blower. The New York Times. Online:

Turner, S. (2018). The Secrets of the Secret Court: An Analysis of the Missing Party and Oversight of the Foreign Intelligence Surveillance Court. Administrative Law Review, 70(4), 991–1019. Online:

Warren, S. D. & Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193–220. Online:

Weaver, R. L. (2011). The James Otis Lecture: The Fourth Amendment, Privacy and Advancing Technology. Mississippi Law Journal, 80, 1131–1227.

Weaver, R. L. (2019). From Gutenberg to the Internet. Free Speech, Advancing Technology, and the Implications for Democracy. (2nd edition) Carolina Academic Press.

Weaver, R. L., Burkoff, J. M., Hancock, C. & Friedland, S. I. (2021). Principles of Criminal Procedure. (7th edition) West Academic.


Download data is not yet available.