By Paul Rosenzweig, The George Washington University Law School
Generally, surveillance comes in three basic forms. First, there is physical surveillance, dating from the times of Alexander the Great and earlier, up to the Stasi State in post-World War II East Germany and to today. This is the traditional form of scrutiny that has always been the province of spies and intruders.
This is a transcript from the video series The Surveillance State: Big Data, Freedom, and You. Watch it now, on The Great Courses Plus.
When one thinks of physical surveillance, the first image that comes to our mind is that of an eavesdropper.
An eavesdropper could, for example, hear a conversation. Or, if he looks in a window, become a Peeping Tom, and see the subject of his surveillance. One could even contemplate surveillance of smellslike, say, the scent of burning cannabis.
As the nature of our physical environment changed, physical surveillance also evolved. The telegraph became a way to rapidly transmit messages around the globe, and governments began exploring ways to intercept those messages.
American electronic surveillance really came of age during the Cold War. It is said that for years, the CIA ran a joint electronic surveillance operation with the Chinese, in the western deserts of China, to monitor Soviet missile launches.
In the mid-1970s, the National Security Agency (NSA) conducted two programs involving electronic interceptions that have, since, proven quite controversial.
One of them, code-named SHAMROCK, involved U.S. communications companies giving the NSA access to all of the international cable traffic passing through their companies facilities. The second program, known as MINARET, created a watch list of U.S. persons whose communications were to be monitored.
To the above traditional forms of surveillance, we must add a third: the collection, and analysis, of personally identifiable data and information about individuals.
Dataveillance is an inevitable product of our increasing reliance on the Internet and global communications systems. As the available storehouse of data has grown, so have governmental and commercial efforts to use this data for their own purposes.
To further frame the context, lets take a look at two surveillance exercises.
Learn more about surveillance in America.
The key to finding Osama bin Laden came from tracking, one of his couriers: Abu Ahmed al-Kuwaiti, who lived in Abbottabad, Pakistan. To track him, the CIA initially used sophisticated geo-location technology that helped pinpoint his cell phone location.
That allowed the CIA to determine the exact type of car that al-Kuwaiti droveit was a white SUV. Using physical and electronic surveillance, the CIA began tracking the vehicle. One day, a satellite captured images of the SUV pulling into a large concrete compound in Abbottabad. Agents used aerial surveillance to keep watch.
The residents of the Abbottabad compound were also extremely cautious. They burned their trashprobably to frustrate a search of that trash that might have yielded DNA samples of the residents.
The United States also learned that the compound lacked a phone or an Internet connection. Again, why? Almost certainly because the residents understood that phone and Internet communications could be tracked, traced, and intercepted.
It was observed that a man, who lived on the third floor, never left. He stayed inside the compound, and underneath a canopy, frustrating overhead surveillance by satellite.
In addition to satellites, the government flew an advanced stealth drone, the RQ-170, over Pakistan to eavesdrop on electronic transmissions from the compound.
The CIA made any number of efforts to identify this man. They tried to collect sewage from the compound to identify fecal matter and run a DNA analysis, but as the sewage contained the effluence of other houses, they couldnt isolate a good sample.
At one point, the CIA got a Pakistani doctor to pretend he was conducting a vaccination program. Nurses tried to get inside the compound and vaccinate the children, which would have allowed them to get a DNA sample, but again without success. To get a closer look, CIA spies also moved into a house on the property next door.
It has been reported that this surveillance operation cost so much money that the CIA had to ask for supplemental funding from Congressfunding that it, of course, received.
In short, during the hunt for bin Laden, the United States employed physical and electronic surveillance and sophisticated data analysis. The result, from an intelligence standpoint, was a success.
By now, most Americans are pretty familiar with the long lines, thorough pat-downs, and X-ray inspections that are part of the process.
But that physical screening comes at the back end of a process that begins much earlier when you first make a reservation to fly. The Transportation Security Administrations (TSAs) security directives require airline passengers to present identification when they make a reservation.
Later, if youre selected for secondary screening, you and your bags will be taken out of line for additional scrutiny. And why is it that we ask for a passengers name along with gender and date of birth?
Learn more about hacking and surveillance.
The reason is because that data is used for a form of dataveillance-screening, known as Secure Flight. Your name and date of birth are checked against a terrorist screening database.
Screenings include flights that overfly but dont land in the continental U.S. This was a key recommendation of the 9/11 Commission, created by the Congress and the president after the September 2001 terror attacks to identify security lapses, and ways to strengthen U.S. defenses.
The Secure Flight program has not, so far as is publicly known, ever actually spotted a terrorist.
There are ways one might legally challenge this kind of surveillance. In 2006, a traveler named John Gilmore challenged the TSAs identification requirement. He asserted that he had a right to travel and that his right to travel included the right to do so anonymously without providing identification.
The federal Ninth Circuit court of appeals agreed, provisionally, that he had a right to travel. But, it said that if he wanted to travel by air, then Gilmore was consenting to the requirement that he provide identification before boarding the plane. If he didnt want to do that, he was free to travel by some other means.
The story doesnt end there, however. For years, ten U.S. citizens were unable to fly to, or from, the United Statesor even over American airspacebecause they were on the governments top-secret No Fly List.
They were never told why theyd made to the list, they didnt have much chance of getting off of it, either. In June 2010, the American Civil Liberties Union filed a lawsuit on behalf of a disabled Marine veteran named Ayman Latif, who was living in Egypt, and the nine others.
Latif won the case. The court concluded that he did have a right to challenge his inclusion on the no-fly list, and was entitled to a process by which he could seek to be removed from it.
It didnt help the governments case that Latif had probably been put on the list by mistake, and should have been removed long before his lawsuit came to court.
The above polar cases bring us full circle to a set of concepts that we need to think about: the balance between transparency and effectiveness.
Some of the physical and traditional forms of surveillance include eavesdropping, looking at the object, or prying over someone, and using smell to do surveillance.
The CIA used drones, satellites, and physical surveillance in the hunt for Osama bin Laden.
Dataveillance is a type of surveillance that includes the collection, and analysis, of personally identifiable data and information about individuals.
Continued here:
Surveillance: Types, Uses, and Abuses - The Great Courses Daily News
- NSA fears quantum computing surprise: 'If this black swan event happens, then we're really screwed' - Washington Times - March 27th, 2024 [March 27th, 2024]
- The NSA Warns That US Adversaries Free to Mine Private Data May Have an AI Edge - WIRED - March 27th, 2024 [March 27th, 2024]
- Five ways to implement zero-trust based on NSA's latest guidance - SC Media - March 27th, 2024 [March 27th, 2024]
- Intel analyst shared classified information on Discord, investigators say - The Washington Post - March 27th, 2024 [March 27th, 2024]
- Water Systems Vulnerable To Cyber Attacks, NSA And EPA Warn Governors - Forbes - March 27th, 2024 [March 27th, 2024]
- Amritpal Singhs mother, kin of other NSA detainees go on hunger strike, want them to be shifted to Punjab jail - The Tribune India - February 24th, 2024 [February 24th, 2024]
- Rob Joyce leaving NSA at the end of March - CyberScoop - February 24th, 2024 [February 24th, 2024]
- NSA cyber director to step down after 34 years of service - Nextgov/FCW - February 24th, 2024 [February 24th, 2024]
- Behind Khattar govts U-turn on NSA against farm leaders, fear of rural blowback, Congress gain - The Indian Express - February 24th, 2024 [February 24th, 2024]
- Payday dispute prompts maintenance worker walkout at NSA Naples - Stars and Stripes - February 24th, 2024 [February 24th, 2024]
- CISA, NSA, and FBI Warn of Chinese Cyber Hacking Army The Presidential Prayer Team - The Presidential Prayer Team - February 24th, 2024 [February 24th, 2024]
- Cyber Security Headlines: Microsoft takes another hit, Energy giant hit by ransomware, the NSA is secretly buying your ... - CISO Series - January 30th, 2024 [January 30th, 2024]
- India now cooperating with Nijjar probe: Canada's NSA - IndiaTimes - January 30th, 2024 [January 30th, 2024]
- Google, WhiteSnake, Outlook, NSA, Juniper, Jason Wood, and More SWN #358 - SC Media - January 30th, 2024 [January 30th, 2024]
- Readout of NSA Jake Sullivan's Meetings with PM Srettha and DPM/FM Parnpree - US Embassy in Thailand - USEmbassy.gov - January 30th, 2024 [January 30th, 2024]
- NSA Admits Secretly Buying Your Internet Browsing Data without Warrants - The Hacker News - January 30th, 2024 [January 30th, 2024]
- Readout of NSA Jake Sullivan's Meeting with CCP Politburo Member, Director of the Office of the Foreign Affairs ... - US Embassy & Consulates in... - January 30th, 2024 [January 30th, 2024]
- Former NSA Saint has a chance to become repeat Super Bowl champion - The Suffolk News-Herald - Suffolk News-Herald - January 30th, 2024 [January 30th, 2024]
- NSA is buying Americans internet browsing records without a warrant - TechCrunch - January 30th, 2024 [January 30th, 2024]
- As NSA buys up Americans' browser records, Uncle Sam is asked to simply knock it off - The Register - January 30th, 2024 [January 30th, 2024]
- NSA buys sensitive data on Americans without any court order - KJZZ - January 30th, 2024 [January 30th, 2024]
- NSA Veteran Teresa Shea Joins Board of Directors of Two Six Technologies - ExecutiveBiz - January 30th, 2024 [January 30th, 2024]
- How the FBI, NSA are preparing for deepfakes and misinformation issue ahead of 2024 elections - CNBC - January 14th, 2024 [January 14th, 2024]
- AI is helping US spies catch stealthy Chinese hacking ops, NSA official says - CyberScoop - January 14th, 2024 [January 14th, 2024]
- AI aids nation-state hackers but also helps US spies to find them, says NSA cyber director - TechCrunch - January 14th, 2024 [January 14th, 2024]
- NSA Director Paul Nakasone to Step Down in Early February - Bloomberg - January 14th, 2024 [January 14th, 2024]
- NSA says cybersecurity will gain many benefits with generative AI - ReadWrite - January 14th, 2024 [January 14th, 2024]
- FBI and NSA directors discuss their concerns about AI - WCBE 90.5 FM - January 14th, 2024 [January 14th, 2024]
- Looking back at 2023 with the NSA's Rob Joyce and Morgan Adamski - CyberScoop - January 14th, 2024 [January 14th, 2024]
- NSA: Benefits of generative AI in cyber security will outweigh the bad - ITPro - January 14th, 2024 [January 14th, 2024]
- AI Identified as Emerging Threat in Cyber Crime by NSA Director - CoinGape - January 14th, 2024 [January 14th, 2024]
- AI is helping China-backed hackers but it's also helping to hunt them down, NSA says - TechRadar - January 14th, 2024 [January 14th, 2024]
- Top 10 misconfigurations: An NSA checklist for CISOs - The Stack - October 20th, 2023 [October 20th, 2023]
- CISA and NSA Issues New Identity and Access Management Guidance for Vendors - TechRepublic - October 20th, 2023 [October 20th, 2023]
- How to Protect Against Evolving Phishing Attacks - National Security Agency - October 20th, 2023 [October 20th, 2023]
- NSA Shares Recommendations to Advance Device Security Within ... - National Security Agency - October 20th, 2023 [October 20th, 2023]
- Nansemond-Suffolk tennis falls to Norfolk Academy Thursday - The ... - Suffolk News-Herald - October 20th, 2023 [October 20th, 2023]
- NSA calls for a 'root and branch' review of Red Tractor - Farmers Guardian - October 20th, 2023 [October 20th, 2023]
- Israel's NSA warns of US intervention as Gaza conflict escalates - IndiaTimes - October 20th, 2023 [October 20th, 2023]
- The U.S. government is still in its Tumblr era. - Slate - October 20th, 2023 [October 20th, 2023]
- Biden's Cyber Command and NSA nominee seen as a pick for continuity - The Record from Recorded Future News - July 17th, 2023 [July 17th, 2023]
- 5 Reasons to Work for the NSA - ClearanceJobs - ClearanceJobs - July 17th, 2023 [July 17th, 2023]
- I will do my best as NSA: Ribadu promises - FRCN HQ - Federal Radio Corporation of Nigeria - July 17th, 2023 [July 17th, 2023]
- Plateau killings: Reps ask NSA to declare national emergency - TheCable - July 17th, 2023 [July 17th, 2023]
- 7th Deputy NSA Meeting of Colombo Security Conclave held in ... - ANI News - July 17th, 2023 [July 17th, 2023]
- Young shepherd from region wins NSA North Sheep trophy ... - Darlington and Stockton Times - July 17th, 2023 [July 17th, 2023]
- HBO film based on NSA leaker Reality Winner slated for May 29 ... - Military Times - May 18th, 2023 [May 18th, 2023]
- Tina Satter on why her NSA whistleblower film Reality is stranger than fiction - Financial Times - May 18th, 2023 [May 18th, 2023]
- Gen. Paul Nakasone Plans to Step Down as NSA Director ... - Executive Gov - May 18th, 2023 [May 18th, 2023]
- Readout of NSA Jake Sullivan's Meeting with CCP Politburo ... - US Embassy & Consulates in China - May 18th, 2023 [May 18th, 2023]
- Young sheep farmers to be given genetic boost by new NSA giveaway - The Scottish Farmer - May 18th, 2023 [May 18th, 2023]
- Sydney Sweeney wanted to be challenged by Reality: Its a different muscle playing someone who is real [Exclusive Video Interview] - Yahoo... - May 18th, 2023 [May 18th, 2023]
- Intercepted: The Biggest Whodunnit of the Century - The Intercept - May 18th, 2023 [May 18th, 2023]
- Personal injury + the No Surprises Act - Chiropractic Economics - May 18th, 2023 [May 18th, 2023]
- PM Narendra Modi e-inaugurating new office complexes of CBI at Shilong, Pune and Nagpur, commemorating the CBI diamond jubilee on Monday. Also seen... - April 4th, 2023 [April 4th, 2023]
- Special Collection Service - Wikipedia - March 31st, 2023 [March 31st, 2023]
- What is the NSA and how does it work? - SearchSecurity - February 5th, 2023 [February 5th, 2023]
- Watch: NSA Ajit Doval is Ambitious, Very Good at Sniffing Power and Being on the Right Side of itAS Dulat - The Wire - December 21st, 2022 [December 21st, 2022]
- Shockwaves win another championship, this time at the NSA Fresno Pilgrimfest - Lompoc Record - December 12th, 2022 [December 12th, 2022]
- EFCC secures forfeiture of N755m, luxury assets from ex-AGF, former aide to NSA The Nation Newspaper - The Nation Newspaper - November 23rd, 2022 [November 23rd, 2022]
- What is the National Security Agency? - Norwich University - October 25th, 2022 [October 25th, 2022]
- Cyber Security Today, Oct. 19, 2022 A warning from the NSA about nation-state attacks, and more - IT World Canada - October 21st, 2022 [October 21st, 2022]
- In the Alphabet Soup of Regulations, the NSA, GFE and AEOB Have Yet to Coalesce - RACmonitor - October 6th, 2022 [October 6th, 2022]
- Do not ignore any communication shared by NSCS, NSA: PM Modi to ministers - The Hindu - October 6th, 2022 [October 6th, 2022]
- NSA Announces Date of the National Cryptologic Museum Grand Opening - National Security Agency - October 2nd, 2022 [October 2nd, 2022]
- NSA and ACLU may face off in the Supreme Court over Wikipedia - Grid - October 2nd, 2022 [October 2nd, 2022]
- The NSA is Here to Help | Decipher - Duo Security - September 27th, 2022 [September 27th, 2022]
- Hollen, Raskin Join with NSA Bethesda Fire Fighters, IAFF Leaders to Highlight Progress on Efforts to Improve Base Conditions, Build New Facility |... - September 27th, 2022 [September 27th, 2022]
- CISA, FBI, NSA, Treasury, Cyber Command, and International Partners Release Advisory on Malicious Cyber Actors Affiliated with Iranian Government... - September 20th, 2022 [September 20th, 2022]
- NATFORCE: Buhari Finally Disbands Security Outfit After Senate Ignored NSA To Recognize Body The Whistler Newspaper - The Whistler Nigeria - September 20th, 2022 [September 20th, 2022]
- China Accuses NSA of Hacking Its Military Research University - VICE - September 9th, 2022 [September 9th, 2022]
- Behind the Toque: An Interview with NSA Noodle Bar Executive Chef Brooke Apfelbaum - greenpointers.com - September 9th, 2022 [September 9th, 2022]
- In the Garden: Tour gives Omahans a chance to see how a 'Bloom Box' works - Omaha World-Herald - September 9th, 2022 [September 9th, 2022]
- Three area teams pickup wins to start football season - The Suffolk News-Herald - Suffolk News-Herald - September 9th, 2022 [September 9th, 2022]
- NSA to reveal identities of big men behind oil theft in Nigeria Presidency - Daily Post Nigeria - August 22nd, 2022 [August 22nd, 2022]
- Former US Cyber Command and NSA chief makes the case for a cyber competition strategy | The Strategist - The Strategist - August 22nd, 2022 [August 22nd, 2022]
- Inaugural India-Central Asia NSA meeting to be held in December - WION - August 22nd, 2022 [August 22nd, 2022]
- Home | Open Source @ NSA - August 8th, 2022 [August 8th, 2022]
- Kennesaw State named top institution for cybersecurity outreach - Kennesaw State University - August 8th, 2022 [August 8th, 2022]
- US city of Boston to mark 75th anniversary of India's Independence with two-day extravaganza - NewsDrum - August 8th, 2022 [August 8th, 2022]