Back to News & Commentary

The Flawed Logic of Secret Mass Surveillance

Jay Stanley,
Senior Policy Analyst,
勛圖眻畦 Speech, Privacy, and Technology Project
Share This Page
December 16, 2013

Privacy is a form of power. Humans are always highly aware who is observing them at any given time and place, and always tailor their behavior to that audience. And they generally work to make sure that their behavior does not reveal things that might put them at a disadvantage. To really gain new insight or leverage over another person, you have to watch them when they dont know theyre being watched so that their guard is down.

So how does a watcher catch a subject unawares? It seems to me the possibilities break down into two broad categories:

  1. Rarity. Use a spying technology or technique that is known to the subject, but is deployed with sufficient rarity that the subject does not expect to be surveilled.
  2. Secret technology. Use a technology or technique that the subject is not aware of. The subject therefore proceeds in the false expectation that his or her behavior cannot be observed when in fact it can be.

Rarity is what law enforcement telephone eavesdropping through warrants has always been based on, as well as most of the petty, everyday eavesdropping and invasions of privacy that individuals sometimes perpetrate against each other.

The second approach requires two things: first, a technological advance that transcends the subjects existing understanding of the possibilities for how they could be spied upon. Second, keeping that advance secret. The thing is, surveillance techniques are very difficult to keep secret. Revelation of the NSAs behavior was almost inevitable because (as I discussed here), its activities extend so far beyond international and American norms and consensus over what degree of surveillance is acceptable in a modern democratic society. Even before Snowden the agency was under pressure from members of Congress who were only by overbroad secrecy rules from blowing the whistle on it, and several whistleblowers from within the NSA had warned in broad terms about the agencys activities.

This on secrecy found that technological secrets can only be expected to be kept secret for a few years, with one year being the most reasonable assumptionand that report was written in 1970, before the internet and the digital revolution made secrets even harder to keep. More recently, a on U.S. intelligence research and development observes,

The global spread of scientific and technical knowledge challenges U.S. national security. It threatens to erode essential capabilities of the U.S. Intelligence Community. U.S. technological superiority is diminishing in important areas, and our adversaries investments in S&T [science & technology] along with their theft of our intellectual property are giving them new, asymmetric advantages.

Thus Rep. Bob Goodlatte (R, VA) incredulously intelligence officials at a recent committee hearing, Did you think a program of this magnitude could be indefinitely kept secret from the American people?

In the future, it will be even harder to catch anyone by surprise. The NSA revelations have been a watershed moment, dramatically and permanently expanding everyones understanding of the possibilities for mass surveillance. Never again will the world return to what now looks like the naivet矇 of the pre-Snowden eraand people will always extrapolate that quantum leap in spying forward, extending their paranoiaor perhaps I should say vigilanceto all future technologies that are not absolutely ironclad in their security.

In short, because it is so difficult to keep spying advances secret, the secret technological advantage approach to spying is inevitably unstable and temporary.

Mass Surveillance
Everything Ive said so far applies to every kind of surveillance. But its interesting to think about how this framework applies to mass surveillance. The Rarity approach is internally contradictory as applied to mass spying: spying that is done en masse cannot be rare and therefore unexpected.

The Secret Technology approach is what the NSA has relied uponand because mass spying violates our civilizations norms, it is even less likely than other spying techniques to remain secret. With its mass spying efforts in recent years, the NSA has burned through a very finite and perishable resource: ignorance. It has been exploiting a temporary gap between what it can do, and what people are aware it can do, in order to gain leverage over some of those people. Post-Snowden, that gap has come to its inevitable end. The agency can try to mine more of this resource (ignorance) by developing new spying technologies of which the world is unawarebut that will be exceedingly difficult because of the new cynicism that has been created.

If neither approach to mass spying is stable, then what we are left with is a situation where either the mass spying is discontinued, or it continues despite the fact that the subjects are aware of it. And such spying will no longer be watching people who dont know theyre being watched; it will be watching people who do know theyre being watched. And those people, because they know theyre being watched, will be careful what they say and do. That will lead to a society full of people being carefuland that is not a free society.

No doubt the NSA will try to overcome the limits with both of the approaches. Theres no question it will continue to reach for temporary technological advantages through secret new spying techniques. And I expect the agency will try to rely upon a sense that, even though the collection of data is not rare, actual examination of communications in a way that can have effects on a persons life, is. In short, for the agency to rely on the Rarity approach.

There are two problems with that. First, it can never work unless people actually have a firm confidence that the actual examination of communications is, in fact, rare. But so far it appears that the agencies want to be free to examine data on everyone to see if they are a terrorist. (That examination may initially, at least, be performed by a computer, but that is irrelevant.) As Acting FBI General Counsel Patrick Kelley in testimony criticizing the proposed USA Freedom Act NSA reform:

From our perspective the proposal is flawed in the sense that it has the assumption or presumption that we know the person were after, and thats the essence of terrorism prevention: we dont know who were after. So if we are limited to seeking numbers from a known, then were not going to be very effective. Again, it bears repeating that were connecting the dots here, so the fewer dots that we have, the fewer connections we will make.

Second, if everybody knows the NSA is watching, that will just lead to workarounds, in which those who feel they absolutely need privacy will adopt other means of communicating that are by definition less efficient (because otherwise they would not be workarounds but the main means of communicating), even if that means a face-to-face meeting in the middle of a field. In addition to imposing inefficiencies on our communications infrastructure, such an approach will guarantee that foreign government employees and other intelligence targets including actual terroristsi.e. the people the NSA most wants to targetwill flock to such workarounds (even while ordinary peoples communications continue to pour into the NSA where they are evaluated by computers for signs of suspicion). And of course, those will become the channels that the security agencies most want to spy upon. And so the arms race will continuewith the agency extending its spying into new vectors of our lives (one day perhaps even open fields) at each turn in that race.

The solution to all of these knotty conundrums is for our security agencies to return to a policy of targeted surveillance, using techniques that are known to the public, and constrained by proper legal rules that are also known to the public. In the end, this is the only way.

Learn More 勛圖眻畦 the Issues on This Page