{"id":1187,"date":"2014-09-24T03:08:43","date_gmt":"2014-09-24T03:08:43","guid":{"rendered":"http:\/\/blogs.dickinson.edu\/hist-282pinsker\/?p=1187"},"modified":"2014-10-02T13:09:34","modified_gmt":"2014-10-02T13:09:34","slug":"getting-to-the-heart-of-the-nsa","status":"publish","type":"post","link":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/2014\/09\/24\/getting-to-the-heart-of-the-nsa\/","title":{"rendered":"Getting to the Heart of the NSA"},"content":{"rendered":"<p><em>By Sam Weisman<\/em><\/p>\n<p>On September 17, Dickinson College welcomed Kate Martin, the president of the <a href=\"http:\/\/www.cnss.org\/\">Center of National Security Studies<\/a>, to deliver a Constitution Day address on the Bill of Rights and NSA surveillance. Her lecture discussed the relationship between liberty and security in the digital age. This timeless struggle has evolved dramatically over the course of American history but clear parallels can be drawn to threats facing the early nation. On September 11, 2001, terrorists affiliated with al-Qaeda hijacked commercial airliners, flying one into the Pentagon and another two into the World Trade Center. The horrific attacks slingshotted the United States into a new age of national security. In response, an ongoing military campaign war launched in Afghanistan and a global war on terror commenced. The conflict merged domestic and foreign relations in a way that continues to strain the relationship between security and liberty.Unlike conventional warfare, enemy combatants can blend seamlessly into civilian populations or be aided by US citizens\u00a0on their mission to conduct acts of violence. When\u00a0conventional means are not sufficient to secure the nation against an unconventional threat, civil liberties have been sacrificed. The most potentially dangerous effect of the NSA scandal is the declining system of checks and balances in the Foreign Intelligence Surveillance Courts (FISC). \u00a0Decisions concerning civil liberties\u00a0must be limited and with adequate oversight.<\/p>\n<p>In a democratic republic like our own, there should be few political surprises. Transparency and\u00a0the\u00a0system of checks and balances should remove the possibility for national shocks like the 2013 <a href=\"http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order\">reveal<\/a>\u00a0of the collection of citizen metadata by the NSA.\u00a0<a href=\"https:\/\/www.eff.org\/deeplinks\/2013\/06\/multiple-new-polls-show-americans-reject-wholesale-nsa-domestic-spying\">Many<\/a> have condemned the program as an intolerable infringement on 4th Amendment rights. How have we gotten here? The problems with NSA surveillance come from the unchecked FISA courts.<\/p>\n<p>Picture, if you will, a closed-doors, windowless court room. A\u00a0<a href=\"http:\/\/www.fisc.uscourts.gov\/about-foreign-intelligence-surveillance-court\">panel<\/a>\u00a0of district court judges appointed by the Chief Justice of the Supreme Court receives a government request from an NSA representative. The\u00a0Foreign Intelligence Surveillance Court (or <a href=\"http:\/\/www.fisc.uscourts.gov\/about-foreign-intelligence-surveillance-court\">FISC<\/a>)\u00a0\u00a0eagerly approves\u00a0the <a href=\"http:\/\/www.washingtonpost.com\/rw\/2010-2019\/WashingtonPost\/2013\/06\/08\/National-Politics\/Graphics\/w-FISA_requests0608.jpg\">vast majority<\/a> of requests (<a href=\"http:\/\/mises.org\/daily\/6672\/FISA-the-NSA-and-Americas-Secret-Court-System\">rejecting<\/a> only\u00a0.0324%, or 11 out of\u00a0\u00a0the 33,949 since 1979)\u00a0without the consent of any other branch of government. The\u00a0isolated judicial decision-making body has made the unquestioned growth of NSA power possible. In her address, Martin questioned this system, &#8220;How much of the decision making can legitimately be carried out in secret, consistent with the constitutional command that democracy requires an open government?&#8221; This question is central to the age-old debate between liberty and security.<\/p>\n<div id=\"attachment_1249\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/blogs.dickinson.edu\/hist-282pinsker\/files\/2014\/09\/FISC_embed.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1249\" class=\"size-medium wp-image-1249\" src=\"http:\/\/blogs.dickinson.edu\/hist-282pinsker\/files\/2014\/09\/FISC_embed-300x156.jpg\" alt=\"http:\/\/www.cfr.org\/intelligence\/has-fisa-court-gone-too-far\/p31095\" width=\"300\" height=\"156\" srcset=\"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/files\/2014\/09\/FISC_embed-300x156.jpg 300w, https:\/\/blogs.dickinson.edu\/hist-282pinsker\/files\/2014\/09\/FISC_embed.jpg 617w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-1249\" class=\"wp-caption-text\">http:\/\/www.cfr.org\/intelligence\/has-fisa-court-gone-too-far\/p31095<\/p><\/div>\n<p>The 1790&#8217;s were a time of similar homeland insecurity. The fledgling government was threatened by infiltration. The members of the early Congress had been <a href=\"http:\/\/www.monticello.org\/site\/research-and-collections\/xyz-affair\">bribed<\/a>\u00a0by French officials and rogue <a href=\"https:\/\/history.state.gov\/milestones\/1784-1800\/citizen-genet\">French agents<\/a> ran amok in the country, inciting dissent against the government. This diffuse threat infiltrated the population and sought to <a href=\"http:\/\/millercenter.org\/president\/adams\/essays\/biography\/3\">influence<\/a>\u00a0upcoming elections. The government feared that the population would support a French invasion. To combat the issue without directly targeting France, the Federalist Congress passed the <a href=\"http:\/\/legal-dictionary.thefreedictionary.com\/Alien+Friends+Act\">Alien and Sedition Acts<\/a> in 1798. The Alien Acts allowed the unwarranted arrest and deportation of non-citizens suspected of aiding an enemy. The Sedition Act <a href=\"http:\/\/www.crf-usa.org\/america-responds-to-terrorism\/the-alien-and-sedition-acts.html\">directly impinged<\/a> upon the First Amendment liberties of the American people by making the &#8220;seditious libel&#8221; of the government punishable. This was loosely defined. Without oversight or an adequate system of checks and balances, the Alien Acts were used as a partisan tool against the Republican party while the Sedition Acts restricted individual liberties.<\/p>\n<p>Although it may have a place in modern security, the processes behind NSA surveillance are in dire need of reform. The FISA courts require significant reform and the <a href=\"http:\/\/thehill.com\/blogs\/congress-blog\/homeland-security\/271421-fisa-needs-oversight-amendment-before-reauthorization\">oversight<\/a> of an outside party. <a href=\"http:\/\/www.heritage.org\/research\/reports\/2012\/11\/foreign-intelligence-surveillance-amendments-act-of-2008\">Recent amendments<\/a>\u00a0to FISA have moved towards Congressional updates and greater transparency. The ACLU has <a href=\"https:\/\/www.aclu.org\/national-security\/fix-fisa-end-warrantless-wiretapping\">petitioned<\/a> to institute greater FISA regulation. NSA surveillance and other security measures may be necessary to national defense. However, open government is the only way to make sure these security measures don&#8217;t go too far. The Alien and Sedition Acts can provide a historical model for security policy gone too far without oversight.<\/p>\n<div id=\"attachment_1273\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/blogs.dickinson.edu\/hist-282pinsker\/files\/2014\/09\/fixfisabutton2_1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1273\" class=\"size-medium wp-image-1273\" src=\"http:\/\/blogs.dickinson.edu\/hist-282pinsker\/files\/2014\/09\/fixfisabutton2_1-300x297.jpg\" alt=\"https:\/\/www.aclu.org\/national-security\/fix-fisa-end-warrantless-wiretapping\" width=\"300\" height=\"297\" srcset=\"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/files\/2014\/09\/fixfisabutton2_1-300x297.jpg 300w, https:\/\/blogs.dickinson.edu\/hist-282pinsker\/files\/2014\/09\/fixfisabutton2_1-150x150.jpg 150w, https:\/\/blogs.dickinson.edu\/hist-282pinsker\/files\/2014\/09\/fixfisabutton2_1-1024x1016.jpg 1024w, https:\/\/blogs.dickinson.edu\/hist-282pinsker\/files\/2014\/09\/fixfisabutton2_1.jpg 1259w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-1273\" class=\"wp-caption-text\">https:\/\/www.aclu.org\/national-security\/fix-fisa-end-warrantless-wiretapping<\/p><\/div>\n<p>Mid-September captures the division between security and liberty in the United States. The anniversary of the 9\/11 tragedy has been represented annually with Patriot Day, a solemn occasion of remembrance. Thoughts will turn to our security as a nation: how can we ensure that this never happens again? Less than a week later, Constitution Day is met with discussions about civil liberties, past and present.\u00a0The fragile balance between liberty and security must be handled openly and with appropriate oversight.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Sam Weisman On September 17, Dickinson College welcomed Kate Martin, the president of the Center of National Security Studies, to deliver a Constitution Day address on the Bill of Rights and NSA surveillance. Her lecture discussed the relationship between liberty and security in the digital age. This timeless struggle has evolved dramatically over the [&hellip;]<\/p>\n","protected":false},"author":2330,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1187","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/posts\/1187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/users\/2330"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/comments?post=1187"}],"version-history":[{"count":0,"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/posts\/1187\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/media?parent=1187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/categories?post=1187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/tags?post=1187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}