{"id":183121,"date":"2017-03-12T19:57:37","date_gmt":"2017-03-12T23:57:37","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-the-surveillance-state-threatens-free-speech-thehill-the-hill-blog\/"},"modified":"2017-03-12T19:57:37","modified_gmt":"2017-03-12T23:57:37","slug":"how-the-surveillance-state-threatens-free-speech-thehill-the-hill-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/freedom-of-speech\/how-the-surveillance-state-threatens-free-speech-thehill-the-hill-blog\/","title":{"rendered":"How the surveillance state threatens free speech | TheHill &#8211; The Hill (blog)"},"content":{"rendered":"<p><p>    What is old is new again. Government surveillance is in the    news, again. The cycle started with President Trump     alleging former President Obama wire tapped Trump Towers.    The cycle continued when Wikileaks     released a trove of documents relating to the Central    Intelligence Agencys hacking tools.  <\/p>\n<p>    Whether President Trumps allegations have merit, or whether    they are baseless should not matter. Whether the CIA spied on    United States citizens or whether it did not should not    matter. What should concern citizens is the governments    ability to spy on them.  <\/p>\n<\/p>\n<p>    Consumers place confidence in the ability of a manufacturer,    whether Apple, Google, or others, to secure electronic devices    from prying eyes. Gone are the days when secure storage meant    purchasing safes, lockboxes, or lockable file cabinets. Now,    secrets are hidden within complex strings of ones and zeros.    The most secure electronic systems cannot offer perfect    privacy, but operate to obscure meaningful data better than the    competition.  <\/p>\n<p>    Technology can help obscure meaningful information. Technology    also provides government increased access to a citizens    private life, habits, and private thoughts. Instead of serving    warrants and physically searching houses, computers, and other    tangible items, government officials can remotely install    malware, access electronic devices and seize photographs,    document files, and contact lists. The Vault 7 revelations,    along with Edward Snowdens prior leaks,    demonstrate the government can remotely activate microphones    and cameras embedded in electronic devices, including    televisions. The government can turn all types of devices,    including televisions, into spying tools.  <\/p>\n<p>    Assuming the government follows proper procedures, it has a    number of options minimally to comply with Fourth Amendment    warrant requirements if it invokes national security as an    excuse for surveillance. The Foreign Intelligence Surveillance    Act (FISA) provides the executive branch broad leeway when    conducting surveillance for national security purposes. The    first option permits the President to authorize warrantless    surveillance in certain circumstances. The second options    allows the Attorney General to authorize    warrant applications in other circumstances.  <\/p>\n<p>    Both warrantless and warranted surveillance are classified.    FISA requires the Attorney General to submit semi-annual    reports    to Congress. Those reports, though, do not need to contain    detailed information. The reports need only list the total    number of applications, the number of applications approved,    and the criminal cases where information gathered is used.  <\/p>\n<p>    Technology does not just provide governments increased access    to a citizens private information; it also provides the    government the ability to conceal any unauthorized access. The    government can spy on citizens without even the most savvy    technology expert knowing. And if the government believes it    can completely avoid detection, or make it look like a foreign    government was behind a hack, why should it apply for    warrants? After all, the government could attribute the    information gleaned to other sources, just as it has with cell    site     simulators.  <\/p>\n<p>    Government surveillance relating to national security poses a    unique threat compared to other criminal investigations. The    president possesses significant authority to investigate    foreign threats. The exercise of that authority, though,    threatens U.S. citizens First Amendment freedom of speech    rights. When conducting surveillance for national security    purposes, it is likely the government will both record    protected speech and will use its authority to monitor groups    with politically incorrect viewpoints.  <\/p>\n<p>    Well before technology permitted widespread surveillance,    Supreme Court Justice Powell wrote,  <\/p>\n<p>    History abundantly documents the tendency of    governmenthowever benevolent and benign its motiveto view    with suspicion those who most fervently dispute its policies.    Fourth Amendment protections become more necessary when the    targets of official surveillance may be those suspected of    unorthodoxy in their political beliefs. The danger to political    dissent is acute where the Government attempts to act under so    vague a concept as the power to protect domestic security.  <\/p>\n<p>    Government surveillance, of political right or political left    groups, makes people think twice before speaking contrary to    the political establishment.     State surveillance of Black Lives Matter allegedly chilled    members desire to engage in political discourse about the    issues of our time. Similarly,     surveillance of Trump officials was used to impeach the    credibility of Lt. Gen. Flynn, attack Attorney General    Sessions, and generally to delegitimize President Trump.    Progressive groups, right leaning groups, and individuals in    the government who threaten its power are equally subject to    government surveillance and potential that surveillance will be    used to silence their dissent.  <\/p>\n<p>    Government may use technological advances to operate on the    edges of Constitutional permissibility. The threats government    surveillance pose to First Amendment freedom of speech rights    should overshadow any discussion on the propriety of the    surveillance state, just as they did before the proliferation    of modern technologies, such as the computer and    smartphone.  <\/p>\n<p>    The Fourth and First Amendments are inexorably linked. Ignoring    one will threaten the other. In the words    of Justice Powell, The price of lawful public dissent must not    be a dread of subjection to an unchecked surveillance power.    Nor must the fear of unauthorized official eavesdropping deter    vigorous citizen dissent and discussion of government action in    private conversation. For private dissent, no less than open    public discourse, is essential to our free society.  <\/p>\n<p>    Jonathon Paul Hauenschild, J.D., is a technology policy    analyst. He is the founder and principal of Franklin Adams    & Co., LLC.  <\/p>\n<p>    The views expressed by contributors are their own and are    not the views of The Hill.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/thehill.com\/blogs\/pundits-blog\/technology\/323511-how-the-surveillance-state-threatens-free-speech\" title=\"How the surveillance state threatens free speech | TheHill - The Hill (blog)\">How the surveillance state threatens free speech | TheHill - The Hill (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> What is old is new again.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/freedom-of-speech\/how-the-surveillance-state-threatens-free-speech-thehill-the-hill-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[162383],"tags":[],"class_list":["post-183121","post","type-post","status-publish","format-standard","hentry","category-freedom-of-speech"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/183121"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=183121"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/183121\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=183121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=183121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=183121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}