Privacy in an Age of Cybersurveillance
Copyright (c) 2024 Russel L. Weaver
This work is licensed under a Creative Commons Attribution 4.0 International License.
Abstract
This article provides an update en events since Edward Snowden, an employee of a National Security Agency (NSA) contractor, stole and released thousands of classified documents in 2013, revealing that the U.S. government was engaged in a massive secret cybersurveilance operation that was amassing information about people all over the world, including U.S. citizens. In the U.S., Snowden’s revelations sparked a spirited debate regarding privacy rights, and in particular whether the U.S. cybersurveillance operation was appropriate in a democratic system. This article describes the scope of the cybersuveillance program, and examines how the courts and Congress responded to the Snowden revelations, and (in particular) how U.S. society evolved in the following years.
Keywords:
How to Cite
References
Adair, D. (1957). “That Politics May Be Reduced to a Science”: David Hume, James Madison and the Tenth Federalist. The Huntington Library Quarterly, 20(4), 343–360. Online: https://doi.org/10.2307/3816276
Angwin, J., Savage, C., Larson, J., Moltke, H., Poitras, L. & Risen, J. (2015, August 15). AT&T Helped U.S. Spy on Internet on a Vast Scale. The New York Times. Online: https://shorturl.at/qN027
Bailyn, B. (1967). The Ideological Origins of the American Revolution. Belknap Press.
Bailyn, B. (Ed.) (1993). The Debate on the Constitution: Federalist and Antifederalist Speeches, Articles, and Letters During the Struggle over Ratification. Part One: September 1787 – February 1788. Library of America.
Baker, P. (2014, January 15). Obama’s Path from Critic to Overseer of Spying. The New York Times. Online: https://shorturl.at/dfgMP
Beeman, R. (Ed.) (2012). The Federalist Papers. Penguin Books.
Berman, E. (2018). Digital Searches, the Fourth Amendment, and the Magistrates’ Revolt. Emory Law Journal, 68(1), 49–94. Online: https://scholarlycommons.law.emory.edu/elj/vol68/iss1/2
Calmes, J. & Wingfield, N. (2013, December 17). Tech Leaders and Obama Find Shared Problem: Fading Public Trust. The New York Times. Online: https://shorturl.at/mtJL8
Carlson, J. D., Goodale, G. M., Quinlan, G. C., Suarez, S. L., Meyer, J. M., McHugh, R., Petty, K. A. & Weinstein, B. H. (2016). National Security Law. The Year in Review. An Annual Publication of the ABA/Section of International Law, 51, 497–513. Online: https://shorturl.at/ostJU
Castle, S. (2013, December 25). TV Message by Snowden Says Privacy Still Matters. The New York Times. Online: https://shorturl.at/ghJL6
Cole, D. (2015, May 6). Here’s What’s Wrong with the USA Freedom Act. The Nation. Online: https://shorturl.at/qrL35
Dallal, R. (2018). Speak No Evil: National Security Letters, Gag Orders, and the First Amendment. Berkeley Technology Law Journal, 33(4), 1115–1146. Online: https://doi.org/10.15779/Z388911R16
Doernberg, D. L. (1985). “We the People”: John Locke, Collective Constitutional Rights, and Standing to Challenge Government Action. California Law Review, 73(1), 52–118. Online: https://shorturl.at/qARSY
Electronic Frontier Foundation (EFF) (s. a.). National Security Letters. Online: https://shorturl.at/dehG4
Gellman, B. & Soltani, A. (2013, October 30). NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. The Washington Post. Online: https://shorturl.at/aDFJL
Guariglia, M. & Mackey, A. (2022, August 22). Victory: Government Finally Releases Secretive Court Rulings Sought by EFF. Electronic Frontier Foundation. Online: https://shorturl.at/mIOR8
Hasan, M. (2015, November 30). Why I Miss George W. Bush. The New York Times. Online: https://shorturl.at/glpT0
Ketcham, R. (Ed.) (1986). The Anti-Federalist Papers and the Constitutional Convention Debates. New American Library.
Konig, D. (2008). Thomas Jefferson’s Armed Citizenry and the Republican Militia. Albany Government Law Review, 1, 250–291.
Maass, P. (2013, August 13). How Laura Poitras Helped Snowden Spill His Secrets. The New York Times. Online: https://shorturl.at/aoxQ2
Mazzetti, M. & Schmidt, M. S. (2013, June 9). Ex-Worker at C.I.A. Says He Leaked Data on Surveillance. The New York Times. Online: https://shorturl.at/qwC28
Mendoza, M. (2013, November 21). Reagan Order Led to NSA’s Broader Spying. The Ithaca Journal.
Montesquieu, Baron de, C. (2011). The Spirit of Laws. Cosimo Classics.
Myers, S. L. & Kramer, A. E. (2013, August 1). Defiant Russia Grants Snowden Year’s Asylum. The New York Times. Online: https://shorturl.at/fuzW6
Paine, T. (1997). Common Sense. Dover Publications.
Risen, J. & Wingfield, N. (2013, June 19). Web’s Reach Binds N.S.A. and Silicon Valley Leaders. The New York Times. Online: https://shorturl.at/nCDMR
Rosenthal, A. (2013, October 24). Clapper and Carney Get Slippery on Surveillance. The New York Times. Online: https://shorturl.at/owJP4
Rubin, A. J. (2013, October 21). French Condemn Surveillance by N.S.A. The New York Times. Online: https://shorturl.at/dhAFG
Savage, C. & Mazzetti, M. (2013, June 10). Cryptic Overtures and a Clandestine Meeting Gave Birth to a Blockbuster Story. The New York Times. Online: https://shorturl.at/dgkGT
Savage, C. & Shane, S. (2013, June 17). N.S.A. Leaker Denies Giving Secrets to China. The New York Times. Online: https://shorturl.at/evB69
Shane, S. (2013a, June 20). Documents Detail Restrictions on N.S.A. Surveillance. The New York Times. Online: https://shorturl.at/yPZ23
Shane, S. (2013b, November 2). No Morsel Too Minuscule for All-Consuming N.S.A. The New York Times. Online: https://shorturl.at/jmyB1
Shane, S. & Sanger, D. E. (2013, June 30). Job Title Key to Inner Access Held by Leaker. The New York Times. Online: https://shorturl.at/cdk08
Shear, M. D. (2015, June 4). Limits Reshape Terror Laws, and Obama’s Legacy: News Analysis. International New York Times.
Shoenberger, A. E. (2010). Connecticut Yankee in Europe’s Court: An Alternative Vision of Constitutional Defamation Law to New York Times v. Sullivan? Quinnipiac University Law Review, 28, 431–489. Online: https://shorturl.at/ejkqQ
Smale, A. (2013, October 23). Anger Growing among Allies on U.S. Spying. The New York Times. Online: https://shorturl.at/AG249
Stanglin, D. (2013, July 31). Report: Snowden Says NSA Can Tap E-Mail, Facebook Chats. USA Today. Online: https://shorturl.at/cioDT
Steinhauer, J. & Weisman, J. (2015, June 4). Surveillance in Place Since 2001 is Cut Back Sharply; New Legislation Curtails Sweeping Monitoring of American Phone Records. International New York Times.
The Editorial Board of the New York Times (2014, January 1). Edward Snowden, Whistle-Blower. The New York Times. Online: https://shorturl.at/fBFG2
Turner, S. (2018). The Secrets of the Secret Court: An Analysis of the Missing Party and Oversight of the Foreign Intelligence Surveillance Court. Administrative Law Review, 70(4), 991–1019. Online: https://shorturl.at/fgtxT
Warren, S. D. & Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193–220. Online: https://doi.org/10.2307/1321160
Weaver, R. L. (2011). The James Otis Lecture: The Fourth Amendment, Privacy and Advancing Technology. Mississippi Law Journal, 80, 1131–1227.
Weaver, R. L. (2019). From Gutenberg to the Internet. Free Speech, Advancing Technology, and the Implications for Democracy. (2nd edition) Carolina Academic Press.
Weaver, R. L., Burkoff, J. M., Hancock, C. & Friedland, S. I. (2021). Principles of Criminal Procedure. (7th edition) West Academic.