{"id":192998,"date":"2017-05-14T17:41:50","date_gmt":"2017-05-14T21:41:50","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/secret-searches-and-digital-civil-liberties-constitution-daily-blog\/"},"modified":"2017-05-14T17:41:50","modified_gmt":"2017-05-14T21:41:50","slug":"secret-searches-and-digital-civil-liberties-constitution-daily-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/personal-empowerment\/secret-searches-and-digital-civil-liberties-constitution-daily-blog\/","title":{"rendered":"Secret Searches and Digital Civil Liberties &#8211; Constitution Daily (blog)"},"content":{"rendered":"<p><p>    In this excerpt from our new Digital Privacy initiative,    Neil Richards from Washington University School of Law tackles    the issue of secret government searchesnamely, instances of    government surveillance that remain secret to the search    target.  <\/p>\n<p>    You can read the full text of Richards white paper at our    special section, A Twenty-First Century Framework for    Digital Privacy, at <a href=\"https:\/\/constitutioncenter.org\/digital-privacy\" rel=\"nofollow\">https:\/\/constitutioncenter.org\/digital-privacy<\/a>  <\/p>\n<p>    Perhaps    surprisingly, the most compelling moment in Oliver Stones    Snowden biopic is the sex scene. Halfway through this movie    about government surveillance and whistleblowing, the audience    is shown a graphic and seemingly gratuitous sexual encounter    involving Edward Snowden (played by Joseph Gordon Levitt) and    his girlfriend Lindsay Mills (played by Shailene Woodley). In    the midst of their passion, Snowdens eyes rest on Lindsays    open laptop, the empty eye of its camera gazing towards them.    In a flash, he recalls an earlier event in which NSA    contractors hacked laptop cameras to secretly spy on    surveillance subjects in real time. Edward and Lindsays mood    was ruined, to say the least, by the prospect of government    agents secretly watching their intimate activities.  <\/p>\n<p>    The scene evokes George Orwells famous warning about    telescreens, the omnipresent surveillance devices in Big    Brothers Oceania, by which the Thought Police could secretly    watch anyone at any time. It also has grounding in reality. The    use of millions of hacked webcams as monitoring devices was a    program known as Optic Nerve, which was part of the Snowden    revelations. Another program leaked by Snowden involved the    surveillance of the pornography preferences of jihadi    radicalizers (including at least one U.S. person), with the    intention being the exposure of their sexual fantasies to    discredit them in the Muslim world. Snowden himself famously    appeared on John Olivers HBO show Last Week Tonight,    humorously but effectively reducing unchecked government    surveillance to the basic proposition that secret surveillance    allowed the government, among other things, to get your dick    pics.  <\/p>\n<p>    Sexual surveillance may get our attention, but in our digital    networked society, in which many of our documents are stored in    the cloud, secret government surveillance powers are vastly    broader than the power to be an electronic Peeping Tom. Today,    the U.S. government has a wide variety of means of secretly    watching and searching the people who live in the United    States, whether they are citizens, permanent residents, or    visitors.  <\/p>\n<p>    How did we get to a place where secret government surveillance    seems both omnipresent and unavoidable? It may be hard to    believe these days, but when the Internet first jumped into the    public consciousness in the mid-1990s, it was touted as a realm    of anarchy and personal empowerment, a tool of freedom rather    than of oppression. At the time, the specter of always-on    secret surveillance was unthinkable for a variety of technical,    political, and legal reasons. Such surveillance was    technologically impossible in a pre-broadband world of    modems and computers that were usually not connected to the    network and in which the Cloud was a dream of technologists and    science fiction writers. It was practically    impossible, because of the high costs of in-person    surveillance. It was politically impossible, too, with    many politicians having first-hand memory of the totalitarian    regimes of the Axis Powers. Legally, too, the law was    settled that the government needed to get a warrant before it    tapped a phone, searched papers, or intercepted an email.  <\/p>\n<p>    How times have changed. These well-established technical and    political roadblocks to widespread secret surveillance vanished    rapidly in the early months of the twenty-first century. When    Al Qaeda terrorists turned four commercial airlines into    missiles and attacked New York and Washington, D.C. in    September 2001, a stunned American President without a strong    commitment to civil liberties began to authorize unprecedented    levels of digital surveillance. From a technological    perspective, the attacks occurred just after the mass adoption    of the Internet, and just before the social media and    smartphone phases of the digital revolution. These advances and    adoptions, running on a stream of previously uncollected    personal data, made it technically possible for the government    to read a persons emails or documents stored in the cloud, or    obtain a minutely-detailed transcript of their location logged    from the GPS chip in their phone. At the same time, these new    technologies started to blur the lines between public and    private, destabilizing settled legal understandings of the    boundaries between what was private and what was not. In this    environment, law enforcement often took the position that in    doing their job of promoting security, it was better to ask for    forgiveness than permission in attacking the newly-available    digital evidence.  <\/p>\n<p>    Yet despite the growth of the surveillance-industrial complex,    there are hopeful signs. Apple and Microsoft, among other    technology companies, have engaged in high-profile litigation    with the federal government on behalf of their users privacy,    including litigation over the security of iPhones and the    governments ability to place gag orders on its searches of    Microsofts cloud and email services.  <\/p>\n<p>    The result of these changes is the rise of a phenomenon I shall    call the secret government search. This is, as the name    suggests, a search by law enforcement of information relating    to an individual. Secret government searches can be    diversethey can be physical or increasingly digital; they can    be executed under a warrant, under no warrant, or under some    intermediate authorization; they can be unknown to all, or    served on a trusted digital service accompanied by an    injunction forbidding notice to the target; and the target may    get delayed notice of the search or no notice ever. Different    kinds of secret government searches can raise different    problems, and these problems may require different solutions.    But at bottom, secret government searches share the essential    characteristic of being government surveillance of which the    target has no notice at the time of the search.  <\/p>\n<p>    In this essay, I attempt to put the rise of secret government    searches into contexthistorical, technological, and most    importantly constitutional. My argument is straightforwardthe    current state of secret government searches is a dangerous    anomaly in our democratic order. It is unprecedented as a    technological and historical matter, and it is inconsistent    with what I believe is the best reading of our constitutional    traditions protecting freedom of thought, freedom of    expression, and freedom from unreasonable searches and    seizures. If we are to faithfully translate our hard-won civil    liberties against the state from the physical realm to the    digital, we need to do better to limit the ability of the    government to peer into the lives of its citizens in ways that    are not only secret but also relatively unconstrained. It is    important to recognize, however, that this is not a question of    civil liberties in cyberspace, as if the digital realm is    somehow a separate one. While the fiction of separate physical    and virtual worlds may have been a useful one twenty years ago,    in todays networked, mobile era of ubiquitous personal    computers, the overwhelming majority of ordinary people use    digital platforms and technologies to live their everyday    lives. Recognition of this fact must also cause us to recognize    that there is not really any such place as cyberspace. On the    contrary, there is only space, and humans in that space trying    to live their livessometimes using digital tools, sometimes    using pre-digital ones, and frequently using a combination of    the two. Yet if we fail to fully extend our hard-won rights in    traditional activities to digital, networked activities, those    rights will be substantially and perhaps even fatally    diminished. If that were to happen, we would all be less safe    as a result.  <\/p>\n<p>    This argument proceeds in four steps. First, I will describe    the lay of the land with respect to secret government searches,    a phenomenon I term the secret search epidemic. I argue that    it is impossible to fully understand the constitutional issues    these searches raise without an appreciation of the essential    technical and other roles played by the technology companies    whose businesses enable the creation of this data in the first    place. Second, I examine these secret searches as searches,    and consider them from the perspective of Fourth Amendment law.    This focuses our attention on the search part of secret    government searches. I argue that the best reading of the    Fourth Amendment in this context is that secret searches are    unreasonable, and that if we permit them, we risk repeating the    mistakes of the past with respect to the Fourth Amendment and    new technologies. Third, I consider whether secret searches are    a threat to First Amendment values, either by virtue of their    secrecy or by the fact that in the digital context they are    often served on cloud providers and accompanied by injunctions    forbidding those companies to ever tell their customers about    the governments accessing their data. I conclude that secret,    unconstrained searches of this kind represent a serious threat    to our First Amendment values. Finally, I chart a path forward    for secret surveillance law, offering four principles that    should govern the delicate task of translating our civil    liberties into the digital society.  <\/p>\n<p>    Read more at:     <a href=\"https:\/\/constitutioncenter.org\/digital-privacy\/secret-searches-and-digital-civil-liberties\" rel=\"nofollow\">https:\/\/constitutioncenter.org\/digital-privacy\/secret-searches-and-digital-civil-liberties<\/a>  <\/p>\n<p>    Filed Under:  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/constitutioncenter.org\/blog\/secret-searches-and-digital-civil-liberties\" title=\"Secret Searches and Digital Civil Liberties - Constitution Daily (blog)\">Secret Searches and Digital Civil Liberties - Constitution Daily (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In this excerpt from our new Digital Privacy initiative, Neil Richards from Washington University School of Law tackles the issue of secret government searchesnamely, instances of government surveillance that remain secret to the search target. You can read the full text of Richards white paper at our special section, A Twenty-First Century Framework for Digital Privacy, at <a href=\"https:\/\/constitutioncenter.org\/digital-privacy\" rel=\"nofollow\">https:\/\/constitutioncenter.org\/digital-privacy<\/a> Perhaps surprisingly, the most compelling moment in Oliver Stones Snowden biopic is the sex scene. Halfway through this movie about government surveillance and whistleblowing, the audience is shown a graphic and seemingly gratuitous sexual encounter involving Edward Snowden (played by Joseph Gordon Levitt) and his girlfriend Lindsay Mills (played by Shailene Woodley).  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/personal-empowerment\/secret-searches-and-digital-civil-liberties-constitution-daily-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187728],"tags":[],"class_list":["post-192998","post","type-post","status-publish","format-standard","hentry","category-personal-empowerment"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/192998"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=192998"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/192998\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=192998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=192998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=192998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}