55 thoughts on “Circling the Drain in the NSA Surveillance Debate

  1. What’s more remarkable than Simon’s faith in the undemonstrated success of these counterterrorism policies is that he thinks the abuses will be any more egalitarian than the abuses committed by any institution.

    I believe this was Jason’s point, and Burt’s, in their initial posts on this subject here.

    On the one hand, I understand Simon’s point about the wake up call. While I’ve known a lot of people on the left who’ve been upset about racial profiling, a level of scrutiny that goes way beyond collecting metadata, the level of outrage we’re now seeing in some circles because of revelations that data is being collected on everyone, including them, far outpaces any outrage they’ve shown in response to racial profiling. So it does seem a bit… if not hypocritical, then selective. “Oh, you mean they’re collecting data on me? Well, now I’m outraged!”

    On the other hand, it seems to me that if racial profiling is wrong for reasons beyond simply that its being discriminatory — that is, if it’s also wrong because treating innocent people like criminals is wrong — then expanding it, even in a limited way (and I hope we can agree that collecting metadata is far less intrusive than, say, repeatedly stopping and frisking people for no reason other than that their skin is too dark or they’re in the wrong neighborhood) is also wrong. What’s more, the expansion of its coverage doesn’t imply, as you, Jason, and Burt note, the expansion of its abuse.Report

  2. “What’s more remarkable than Simon’s faith in the undemonstrated success of these counterterrorism policies is that he thinks the abuses will be any more egalitarian than the abuses committed by any institution.”

    Hmmmmmmmmm…………..faith in undemonstrated success………why do I think ‘War on Drugs’?Report

  3. What’s more remarkable than Simon’s faith in the undemonstrated success of these counterterrorism policies is that he thinks the abuses will be any more egalitarian than the abuses committed by other institutions.

    Surely it will be the poor, racially and ethnically marginalized that suffer the most under an ever expanding surveillance regime, just as they suffer more under nearly every other policy.

    Simon’s point is that the big-data approach to law-enforcement is just as likely to lead to more egalitarian outcomes, and your vague reference to the disparate outcome nearly every other policy doesn’t really rebut this point. As Simon originally argued, the risks for abuse that you reference are already present in any law enforcement policy. But where PRISM-type programs differ is in replacing much of the biased human element with hypothesis-free data mining. In the scenario that Simon describes pre-PRISM, a detective would have to dig through the scraps of publicly available information on the suspect’s social circle to prioritize potential leads. How high is the likelihood that someone from a marginalized group – a recent immigrant, an Arabic sounding last name, attendance at a Mosque – will be unfairly targeted? I’m sure detectives working under pressure with limited evidence take this kind of profile-based shortcut all the time. With PRISM, on the other hand, all available social network information is analyzed for trends and compared against a massive database of benign individuals. Dumb profiling based on name or appearance won’t even factor in, and the content of the conversations will be weighed much more heavily than relatively benign indicators like ethnicity or religion or income. It is not obvious to me that the latter system introduces more bias, and quite likely that it does the opposite.Report

    1. I think the crux of programs like PRISM falls to two questions:

      A) Who has access to the database
      B) How is the data accessed?

      Limit access to LEO, and bar political access, and at least you can limit the potential abuses to a degree.

      Construct a database that can only provide data when an algorithm pings to a threat, rather than one that can be scanned by name, ethnicity, etc – that way the database can not be used by someone with an axe to grind against an individual.Report

      1. Exactly. Anonymizing this system would be a peace of cake. Heck, make it so the thing can only ping once you’ve gotten a warrant for the individual, forcing it to be a secondary information system. The problem is that even after Mr. Gach argues that each tool presents unique benefits and costs, he fails to consider the serious social benefits of such an automated system can provide, particularly to traditionally marginalized groups.

        Not to get too deep into the psychoanalysis, but I think part of the problem is that if you asked various people the following question: “You’re in an airport screening line and are getting profiled for a “special” screening, would you rather the profiler be a random TSA agent who gets to see your passport or a soulless computer that gets to see your passport and your cellphone metadata?” you’d get a very different answer depending on who you ask. I’m quite sure my Sikh co-workers – who “randomly” get screened every time they fly – would pick the soulless computer, but they’re not the ones driving this conversation.Report

      2. “I think the crux of programs like PRISM falls to two questions:

        A) Who has access to the database”

        I’m sorry, but that’s classified.

        “B) How is the data accessed?”

        I’m sorry, but that’s classified.

        “Limit access to LEO, and bar political access, and at least you can limit the potential abuses to a degree.”

        Access is limited to Cleared, Pure Americans with Pure Motives. Anybody who tells you otherwise is lying, and we have a 99% redacted document to prove it.Report

      3. I think there’s a third, and that’s what data is being collected.

        Does it, for instance, contain cell-phone pings to a cell tower, and chart travel via switching towers? Meta data can mean a lot of things. We were mislead about our bank records.

        We were mislead about the privacy of overseas phone calls. Now, we’ve been mislead about the sum total of our communications via cellphone and internet. Because there is a very disturbing pattern of collecting as much as possible and 1) keeping the actions secret, and 2) lying about the actions.

        This now spans two administrations, so I have to presume much of what we’ve witnessed is the culture of the natural security apparati.Report

    2. “But where PRISM-type programs differ is in replacing much of the biased human element with hypothesis-free data mining. ”

      First, any action taken by people will be filtered through people. It’s likely that various human parties will be tasked with sifting through the automated output, and deciding which things to follow up on, and how.

      Second, people will program those algorithms. And adjust them.

      Third, those algorithms will not necessarily start ‘unbiased’.

      Fourth, the costs of false positives will be least when the victims have lower power, status and money. That will feed back into (1) and (3).

      Fifth, this all assumes that the program will not be quite deliberately steered in the sort of directions that many criminal ‘justice’, ‘national security’ and police programs have ended up going.Report

  4. We need to have this debate … right , after 7 years of the decision secretly dictated .
    Everybody’s changing the subject , secret laws , secret courts , secret decisions .
    Means and methods of doing things you can’t talk about because they can’t release the details .
    Not even possible to debate the limits of what can’t be mentioned . Its a joke thats going to boil down to blind obedience or blind scepticism

    one hell of a way to run a countryReport

    1. That’s why I’m for ending it. Full stop.

      Any power someone has will eventually be abused. We see this all over the gov’t. The only way to prevent abuses is to eleminate the acess to the data.Report

      1. This is the key point. All government programs will be abused–the question is whether the benefits outweigh the abuses.

        I’m of the mind, for instance, that whatever abuses to social security disability, or TANF, the benefits are too great to get rid of the programs.

        With counterterrorism surveillance though, I’m extremely skeptical (i.e. have no reason to believe) that that is the case. Until the NSA is able to show me proof of why I need them on that wall, I’m for getting them off of it before they, to use Simon’s analogy, accidentally shoot someone.Report

        1. “This is the key point. All government programs will be abused–the question is whether the benefits outweigh the abuses.”

          And what controls, follow-up, auditing, etc. are available. With these programs, the high-end guess would be ~1% of the controls, follow-up, auditing, etc. that other government programs get.Report

    1. Incidentally, Stillwater, I spent some time yesterday replying to your last comments on that other NSA thread, regarding theory of “speech acts,” only to discover at the moment of submission that comments had been closed (automatically, part of a 4-day rule on FP posts, I am given to understand).Report

      1. Do you still have that comment? I’d love to read it. I checked last night for a response and was surprised to see comments closed. (Maybe there’s a new protocol in town?)

        I doubt that a thread will arise where an in-depth inquiry into the logic and analysis of speech acts is appropriate. So unless you anticipate the League turning radically towards the Philosophical, here’s my email: whitesr {{at}} live {{dot}} com.Report

          1. Maybe we can get Chris involved. I know he has views on this stuff. And Shazbot. Jaybird might (heh, of COURSE he does). Others. Maybe an off the cuff post?

            If you don’t want to do that, CK, we’ll keep it tight. Just email me with it.Report

              1. It’s a comment he wanted to submit to a closed post, so no comment rescue.

                We’re discussing options. (Tho, now I feel bad about bringing it up before CK had a chance to weigh in.)Report

              1. Thought so, but didn’t want to sound like a smart ass saying it.

                I think you’ve referred to him as the Devil before, tho, yes? That’s prolly why I knew. Also, that weird use of the word “signifier”…Report

              2. It’s one of his more famous essays, at least in the English speaking world. It’s part of his debate with Searle, which led Searle to basically say he didn’t understand a word he said.Report

              3. This must have directly preceded Searle’s book “The Construction of Social Reality”, yes? If so, it would explain his radical turn.Report

              4. Tho, of course, if Searle doesn’t understand a word he’s saying based on arguments from another guy, then how do we know that that guy understands a word he’s saying? Didn’t Derrida write a book with the thesis that meanings are indeterminate (or something) and then put a line thru every sentence of the book to make his point? Or am I misremembering things?Report

              5. Partially. He talks of something like indeterminacy, and that’s actually related to the topic of that essay, but no books completely struck through.

                And Searle was pretty condescending. I think he saw Derrida as a charlatan.Report

            1. I generally think Austin is right about speech acts.

              How is this relevant to the NSA or any political debate? (I’m not saying it isn’t relevant, just wondering.)Report

              1. It isn’t. It’s the continuation of a conversation CK and I were having about the analysis of speech acts. VERY heavy stuff, Shazbot. I don’t know that a robot is capable of understanding it. But your welcome to participate if CK decides to post it even if your contributions will be considered less than human.Report

              2. My contributions will be strings of symbols arranged in ways that follow your rules of syntax. But, my sentences will not have semantic meaning, no matter how much they appear to. You know, because I am just a damned robot, unlike you smelly apes with your “spark of the divine.”Report

              3. Sure, but I’m not a robot bro. Big difference.

                Look, all the Chinese Room (ahh Searle!, you crazy genius) shows is that syntax is necessary for language use. Not semantics. And since there is no syntax, the Chinese Room fails, as do all robots.

                As the prophet of our time said, If a lion could speak we could not understand him.Report

              4. “Sure, but I’m not a robot bro. Big difference.”

                What reason do you have for saying that you’re not a robot? Maybe a human-looking Cylon, perhaps?

                All I see is that you’re typing syntactically correct (for the most part) strings of symbols together that I see on my screen. I don’t see any semantics. Why do you think your sentences carry semantic meaning?Report

              5. Also, I hope you were tryng to write, “I am not a robot, bro” instead of, “I am not a ‘robot bro'”

                Nothing more irritating than a robot bro. We call them “robros.”Report

  5. Sorry, y’all, that I couldn’t participate in and deconstructively divert the above colloquy on Searle and Derrida. Am thinking about how to continue the discussion if and when I can. Worse comes to better, I can always host it at my own blog, I dunno, sometime in the next days or weeks, unless of course the LOOG Powers that Be, Whoever They Are, don’t do the right thing in the meantime and give us a sub-blog dedicated to this purpose. As for doing it up as a post or comment rescue or whatever, I’ve never been initiated into the secret handshakes and so on, so don’t know anything about that. IMO it would be worth doing, and as opaquely as possible, even if only to dismay Hanley.Report

      1. Well, as I said, Stillwater, I am not currently in a position to make anything happen here except by hijacking a thread somewhere, possibly in the shadow of a merciless 4-day thread-shutdown rule. As is typical for this “place,” unless you’re in the club, it’s a complete mystery how all such decisions on FP access, sub-blog privileges, etc., are made, or even whom to contact or how to do it. In fact, it’s such a deplorable example of non-transparency and non-accountability that I’m not sure I could justify giving it an implicit endorsement by authoring a post, which in the LOOG’s implicit class system is very different from being a mere commenter.Report

        1. CK,

          The reasoning for the shutdown rule is that, well, this place is administered by volunteers and it becomes a drain on our time and resources when threads spiral out of control. Threads that last more than four days do so at a rapid clip (the longer a thread goes, the more likely it is that it has devolved into insults or the repeating of previous points, but more acrimoniously and at a higher volume). A uniform standard, consistently applied, comes across more fair than 100,000 questions about why we shut down this thread but not that thread, and why we shut it down precisely when so-and-so got the last word.

          I can understand your frustration. While perhaps an announcement would have been ideal, it changed a number of times until the right number of days to leave threads open was found.

          I would not worry about baggage that comes with being a guest post author. We maintain a reasonably liberal policy in that regard. It isn’t an indication that we favor or disfavor someone. A couple months before being invited to be a contributor, I had a guest post proposal that was denied. On the other hand, relatively new commenters and people who rarely comment at all have been given the floor.Report

Comments are closed.