The Electronic Frontier Foundation has rounded up the five most discredited arguments advanced by apologists for NSA spying, including "The NSA has Stopped 54 Terrorist Attacks with Mass Spying"; Just collecting call detail records isn’t a big deal"; "There Have Been No Abuses of Power"; "Invading Privacy is Okay Because It’s Done to Prevent Terrorist Attacks"; and "There’s Plenty of Oversight From Congress, the Foreign Intelligence Surveillance Court, and Agency Watchdogs." Each of these claims is meticulously debunked in the post.
2. Just collecting call detail records isn’t a big deal.
The discredited claim
The argument goes like this: Metadata can’t be privacy invasive, isn’t very useful and therefore its collection isn’t dangerous—so the Constitution shouldn’t protect it. Even the President said, “what the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people’s names, and they’re not looking at content”—as if that means there is no privacy protection for this information.
Why it’s not credible:
As former director of the NSA and CIA Michael Hayden recently admitted: “We kill people based on metadata.” And former NSA General Counsel Stu Baker said: “metadata absolutely tells you everything about somebody’s life. If you have enough metadata, you don’t really need content.”
In fact, a Stanford study this year demonstrated exactly what you can reconstruct using metadata: “We were able to infer medical conditions, firearm ownership, and more, using solely phone metadata.” Metadata can show what your religion is, if you went to get an abortion, and other incredibly private details of your life.
The Top 5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible
[Cindy Cohn and Nadia Kayyali/EFF]
(Image: 5 Cinco Five Fem Vijf Viis Viisi Cinq Fünf Öt Fimm Lima Cinque Pieci Penki Piatka Cinci Pet Beç, Losmininos, CC-BY-SA)
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or going to, the final hop in the network (known as an exit node) gets to know what webserver you are connecting […]
Today, The Intercept published leaked documents that contain the FBI’s secret rules for targeting journalists and sources with National Security Letters (NSLs)—the controversial and unconstitutional warrantless tool the FBI uses to conduct surveillance without any court supervision whatsoever.
Facebook recently told Fusion reporter Kashmir Hill that Facebook uses location data to recommend friends. People freaked out. Facebook retracted the statement. Then, the social media giant said what, that’s crazy, LOL, no. No, we didn’t do that at all. Now, Facebook’s communications team tells Hill the confusion arose “because there was a brief time […]
If you’ve got a coding career on your mind, few programming disciplines will take you farther than a commanding knowledge of the Python language, which is not to be mistaken for parseltongue. Its versatility and ease of use make it a go-to for any coding project…so master Python now with this all-inclusive all-level python programming course […]
The realm of web development is constantly evolving. New platforms, languages, and processes materialize all the time, so staying on top of all that innovation is a tall order.Whether you’re brushing up on new tricks, starting from scratch, or just looking to make your own website a little jazzier, Rob Percival’s new Complete Web Developer Course 2.0 (now […]
Folks used to rely on alarms to protect their home – and before that, the family dog. Now, anyone looking to guard their homes can choose from some high-tech options, including the Amaryllo iCamPRO FHD Home Security Camera (now just $219 in the Boing Boing Store).In fact, this 2015 CES “Best of Innovation” award-winner boasts so many features, it’s […]