The Electronic Frontier Foundation has rounded up the five most discredited arguments advanced by apologists for NSA spying, including "The NSA has Stopped 54 Terrorist Attacks with Mass Spying"; Just collecting call detail records isn’t a big deal"; "There Have Been No Abuses of Power"; "Invading Privacy is Okay Because It’s Done to Prevent Terrorist Attacks"; and "There’s Plenty of Oversight From Congress, the Foreign Intelligence Surveillance Court, and Agency Watchdogs." Each of these claims is meticulously debunked in the post.
2. Just collecting call detail records isn’t a big deal.
The discredited claim
The argument goes like this: Metadata can’t be privacy invasive, isn’t very useful and therefore its collection isn’t dangerous—so the Constitution shouldn’t protect it. Even the President said, “what the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people’s names, and they’re not looking at content”—as if that means there is no privacy protection for this information.
Why it’s not credible:
As former director of the NSA and CIA Michael Hayden recently admitted: “We kill people based on metadata.” And former NSA General Counsel Stu Baker said: “metadata absolutely tells you everything about somebody’s life. If you have enough metadata, you don’t really need content.”
In fact, a Stanford study this year demonstrated exactly what you can reconstruct using metadata: “We were able to infer medical conditions, firearm ownership, and more, using solely phone metadata.” Metadata can show what your religion is, if you went to get an abortion, and other incredibly private details of your life.
The Top 5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible
[Cindy Cohn and Nadia Kayyali/EFF]
(Image: 5 Cinco Five Fem Vijf Viis Viisi Cinq Fünf Öt Fimm Lima Cinque Pieci Penki Piatka Cinci Pet Beç, Losmininos, CC-BY-SA)
For $170, Motherboard’s Joseph Cox bought SpyPhone Android Rec Pro, an Android app that you have to sideload on your target’s phone (the software’s manufacturer sells passcode-defeating apps that help you do this); once it’s loaded, you activate it with an SMS and then you can covertly operate the phone’s mic, steal its photos, and […]
China’s nightmarish “citizen scores” system uses your online activity, purchases, messages, and social graph to rate your creditworthiness and entitlement to services. One way your score can be plunged into negative territory is for a judge to declare you to be a bad person (mostly this happens to people said to have refused to pay […]
Edinburgh’s Nahid Akram installed a CCTV system that let him record his downstairs neighbours Debbie and Tony Woolley in their back garden, capturing both images and audio of their private conversations, with a system that had the capacity to record continuously for five days.
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]
Learning new skills is a great way to improve your resume and stand out from other candidates. Especially in a workforce in which many job-seekers have a wide variety of qualifications. With lifetime access to Virtual Training Company, you won’t have to choose a specific focus. You can pick up new expertise whenever you deem it […]