{"id":1350,"date":"2014-09-25T01:04:31","date_gmt":"2014-09-25T01:04:31","guid":{"rendered":"http:\/\/blogs.dickinson.edu\/hist-282pinsker\/?p=1350"},"modified":"2014-10-02T13:08:44","modified_gmt":"2014-10-02T13:08:44","slug":"a-loss-of-privacy-in-the-name-of-national-security","status":"publish","type":"post","link":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/2014\/09\/25\/a-loss-of-privacy-in-the-name-of-national-security\/","title":{"rendered":"A Loss of Privacy in the Name of National Security"},"content":{"rendered":"<p><em>By Courtney Wojcik<\/em><\/p>\n<div style=\"width: 489px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.henry4school.fr\/Sciences\/images\/big-brother\/humanr11.jpg\" alt=\"\" width=\"479\" height=\"392\" \/><p class=\"wp-caption-text\">http:\/\/www.henry4school.fr\/Sciences\/big-brother.htm<\/p><\/div>\n<p><a href=\"http:\/\/www.firstamendmentcenter.org\/hall-of-fame\/kate-martin\">Kate Martin<\/a>\u2019s Constitution Day Address at Dickinson College framed the persisting struggle for power between the executive and legislative branches through the lens of government surveillance. Her approach chronicled the loss of privacy brought by the executive\u2019s unrestrained assumption of power and the largely unsuccessful checks employed by Congress. Martin claimed that this has led to the potential for the easy creation of a \u201cpolice state\u201d (Martin, Dickinson College Clark Forum). Martin presented a convincing case for the necessity of government transparency supported by historical analysis.<\/p>\n<p>This debate stems from the opposing values outlined in the Constitution and the Bill of Rights. <a href=\"http:\/\/constitutioncenter.org\/constitution\/the-articles\/article-ii-the-executive-branch\">Article II<\/a> of the Constitution stresses the importance of executive capabilities to protect the nation, primarily through the power to act as \u201ccommander in chief\u201d (US Constitution, Article II). According to Martin, this clause gives the president the ability to hide actions under the guise of national defense and has led to the executive\u2019s encroachment on public privacy.<\/p>\n<p>In contrast, the Bill of Rights ensures \u201ca reasonable expectation of privacy\u201d (Martin, Dickinson College Clark Forum). Under the <a href=\"http:\/\/constitutioncenter.org\/constitution\/the-amendments\/amendment-4-search-and-seizure\">4<sup>th<\/sup> Amendment<\/a>, citizens are protected from unreasonable searches and seizures of property, limiting the government\u2019s power to lead investigations based on hearsay and unwarranted information. These two opposing ideals, both vital to liberty, have led to a constant struggle between the protection of privacy and national security.<\/p>\n<p>The executive branch has historically usurped the power of privacy by over emphasizing the importance of national security. During the 1798 Quasi-War with France, Congress\u00a0passed the <a href=\"http:\/\/www.ourdocuments.gov\/doc.php?flash=true&amp;doc=16\">Alien and Sedition Acts<\/a> in an attempt to protect the government from \u201cscandalous and malicious writing\u201d (Herring, 87). George Herring, the author of <em>From Colony to Superpower<\/em>, asserts that although the Sedition Acts were a relatively liberal interpretation of libel laws, they were instated in the interests of national security at the expense of free speech.<\/p>\n<p>This violation of natural rights is repeated throughout American history. For example, the 1936 <a href=\"http:\/\/www.oyez.org\/cases\/1901-1939\/1936\/1936_98\">US v. Curtiss-Wright Export Corp<\/a>\u00a0Supreme Court case reaffirmed the belief that secrecy of the executive may be highly necessary in international affairs (Martin, Dickinson College Clark Forum).<\/p>\n<p>The most recent evidence of an invasion of privacy is the <a href=\"http:\/\/www.justice.gov\/archive\/ll\/highlights.htm\">USA\u00a0PATRIOT Act<\/a>. Justified by the need for tightened national security after 9\/11, the <a href=\"https:\/\/www.nsa.gov\">NSA<\/a> was granted the authority to operate outside of FISA\u2019s parameters. This is concerning because as technological capabilities have increased, the strength of restraints on government has decreased. Currently, NSA has the capacity to pick up all international communications, and most likely keeps records of domestic calls (Martin, Dickinson College Clark Forum).<\/p>\n<p>Congress has attempted to barricade these violations through acts of law, and are periodically supported by the Supreme Court. The 1952 <a href=\"http:\/\/www.oyez.org\/cases\/1950-1959\/1951\/1951_744\">Youngstown Sheet &amp; Tube Co. v. Sawyer<\/a>\u00a0case reaffirmed the legislative power of Congress in \u201cboth good and bad times\u201d (Justice Hugo Black). This case established the principle that the president cannot overstep his boundaries even in times of war, and that his power is greatest when acting with Congressional support (Martin, Dickinson College Clark Forum).<\/p>\n<p>The\u00a0<a href=\"https:\/\/www.google.com\/search?client=safari&amp;rls=en&amp;q=church+committee&amp;ie=UTF-8&amp;oe=UTF-8\">Church Committee<\/a>, formed to investigate intelligence gathering after the Watergate Affair, was one of the first steps to reform. While they acknowledged the potential of foreign influence, they still called for structural changes to create a system of oversight. Although the Church Committee achieved is goal of increased government transparency, the Bush administration blamed their failure of detecting 9\/11 on the very same results.<\/p>\n<p>Furthermore, the <a href=\"http:\/\/fas.org\/irp\/agency\/doj\/fisa\/\">Foreign Intelligence and Surveillance Act<\/a> of 1978, which explicitly prohibited Article II powers in regards to domestic phone tapping, was amended to lessen its restraints. Under the 2008 version, individualized warrants are no longer necessary, and although US citizens cannot be directly targeted, wire tapping is permissible if they are linked to foreign influences in any way (Martin, Dickinson College Clark Forum).<\/p>\n<p>The persistent assumption of power by the executive branch, despite obstacles\u00a0presented by Congress and the Supreme Court, has created a precedent for Bill of Rights violations. Congress, through the power of the purse and legislative action, has the ability to stop aggressive executives. Until this issue is brought to public attention, however, we have no way of knowing that surveillance activities do not impede civil liberties. If government actions remain classified under national security, there is no way to protect against the loss of privacy. Without the ability to check this growing power, the United States is under the constant threat of developing into a police state.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Courtney Wojcik Kate Martin\u2019s Constitution Day Address at Dickinson College framed the persisting struggle for power between the executive and legislative branches through the lens of government surveillance. Her approach chronicled the loss of privacy brought by the executive\u2019s unrestrained assumption of power and the largely unsuccessful checks employed by Congress. Martin claimed that [&hellip;]<\/p>\n","protected":false},"author":2333,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1350","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/posts\/1350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/users\/2333"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/comments?post=1350"}],"version-history":[{"count":0,"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/posts\/1350\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/media?parent=1350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/categories?post=1350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.dickinson.edu\/hist-282pinsker\/wp-json\/wp\/v2\/tags?post=1350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}