Chinese and U.S. Models

Many aspects of our respective societies and governments follow different rules and approaches to organizing our communities. We presumably prefer (most of) our choices over theirs and vice versa. In explaining why we prefer ours, we might freely criticize theirs. But we generally have no right to demand that they abandon their approach and adopt ours.

Consider China’s Social Credit System.  In the U.S. we are “well accustomed to credit checks: data brokers such as Experian trace the timely manner in which we pay our debts, giving us a score that’s used by lenders and mortgage providers. We also have social-style scores, and anyone who has shopped online with eBay has a rating on shipping times and communication, while Uber drivers and passengers both rate each other; if your score falls too far, you’re out of luck.

“China’s social credit system expands that idea to all aspects of life, judging citizens’ behaviour and trustworthiness. Caught jaywalking, don’t pay a court bill, play your music too loud on the train — you could lose certain rights, such as booking a flight or train ticket.”  “China social credit system explained”

A good Social Credit score will ease access to loans and other good things. Compared to our approach to collecting information on our likely credit worthiness, the more comprehensive and centrally organized rating is more efficient and comprehensive. But we are very aware of the Chinese Communist Party’s sensitivity to criticism and its potential (if not certainty) for abusing such extensive access to information on our personal behavior. So, we would never allow such a system.

But what about the U.S.’s strong support (and push) for AML/CFT (Anti-Money Laundering and Combating the Financing of Terrorism) laws and procedures?  How do we (how can we) justify that? The U.S. requires that all financial firms collect information about their customers (KYC–Know Your Customer) that facilitates the government’s tracing payments of potentially illegally gained money and it has forced this requirement on all countries using U.S. dollars. The cost of these requirements is enormous. But why follow allegedly illegally gained money when the government can’t prove that it was illegally gained in the first place? If it could, the government should attack the illegal activity at its source. Thus, it claims, but cannot prove, that the money was illegally earned. Not only are AML requirements very expensive but the benefits (identifying criminals) are negligible and morally indefensible. “Operation Choke Point”

The issue of whether to require a so-called vaccination passport to document that the bearer has been vaccinated in order to enter facilities that require such proof, provides another example of a clash between efficiency and convenience and privacy. The pros and cons of such documentation are currently being debated in the U.S.  “vaccine passports”

My point is that each country has its own models for organizing and sharing information and for enforcing its laws.  We have every right, and should, carefully evaluate our own practices. What China chooses to do, is China’s business. Fortunately, we live here.

Terrorism: Security vs. Privacy

We all care about our personal and national security and about our individual freedom, of which our privacy is an important element. Measures that serve both are win win and thus uncontroversial, but often measures that enhance one diminish the other. How and when to use such measures (tools) involve agreement on the balance of risks between security and privacy. Striking the best balance requires public review and debate and constant monitoring as I have discussed before. https://wcoats.wordpress.com/2016/03/24/fighting-terrorists-part-ii/

Tools that enable our government to collect information on and track individuals can enhance our security by detecting and hopefully interrupting plans to carry out terrorist attacks. The existence of such capabilities, e.g., to monitor phone calls, emails, payments, and physical movements, also create the capability of collecting such information on people for other purposes, e.g. for commercial or political espionage. Governments through out the world have used such tools to monitor and suppress the “undesirable” activities of their foreign enemies and sometimes of their own citizens. Limits and safeguards on the use of such tools can mitigate the risk that they can be misused to get private information on individuals for other unwarranted purposes.

Finding the best balance between security and privacy is difficult but important for our freedom. We know or assume that we know how Russia, for example, uses surveillance tools on its own citizens. We generally believe that our own government only uses such tools to enhance our security. But the risks of and the growing actual misuse of government powers for political ends (e.g., targeted IRS audits on political enemies, illegal surveillance of a government employee’s girl friend or wife, etc.) are challenging our, perhaps, naïve faith in the honestly of our government. Hillary Clinton’s mishandling of classified email and Russian theft of U.S. government personnel records are nothing compared to the temptation to steal historical data on the activities of Donald Trump and Mrs. Clinton.

The credible rule of law is one of the critical foundations of our personal freedom. It both protects and limits the extent and domain of our privacy. The principle of “Innocent until proven guilty” is an essential element of the rule of law. It evaluates whether an act has violated the law. In a free society people are not punished for acts contemplated but not committed. Acting against people the state believes might be likely to or inclined to violate the law, for example, that it thinks are likely to commit a terrorist act, would violate this fundamental principle of a free society. An exception to this general rule would be the arrest of a person having the instruments and ingredients for making a bomb and supported by evidence that he plans to make and use the bomb.

Following the terrorist attacks in New York and Washington DC on 9/11, public sentiment shifted its balance between security and freedom in favor of security. The so-called PATRIOT act signed into law by President George W. Bush on October 26, 2001, reflected that shift by infringing on our privacy and traditional rights in ways that would not have been accepted earlier. Moreover, measures that were initially considered temporary and emergency in nature have become increasingly accepted as normal. Even after a slight curtailment of the provisions of the PATRIOT act when it was renewed in 2015 most of these measures were left in place. No one seems shocked today that the government maintains a “No Fly” list based on suspicions that certain people who have committed no crimes might be potential terrorists. Such profiling unsurprisingly results in Middle Eastern Muslims dominating the list, a racial and religious discrimination that violates existing anti discrimination laws and would not have been tolerated before 9/11.

It is not unusual today to hear people who claim to appreciate the importance of the First Amendment to the US Constitution (freedom of speech) suggest that radical Islamist websites that attempt to recruit ISIS Jihadists should be blocked. Most of my friends are too young to remember the anti-communist witch hunts of Senator Joseph McCarthy of the 1950s from which we coined the term McCarthyism. It was a time when a frightened public saw communists under every bed. Soviet spies, a legitimate target for arrest and punishment, were often confused with Marxists (communists), who espoused an economic system now rightly discredited. Those of us who still support freedom of speech believe that bad and pernicious ideas are best defeated with reasoned counter arguments. We believe that it is potentially dangerous to our freedom to allow our government to determine what we can read, hear, or see.

Edward Snowden did our country a great service by forcing a public discussion of what safeguards are needed to strike the balance desired by the public between their security and their privacy. I have written about Snowden before:  https://wcoats.wordpress.com/2013/12/24/the-year-of-edward-snowden/    I recently viewed the movie “Snowden” and the documentary about the same events called “Citizenfour” and highly recommend both. The Heritage Foundation has contributed to this discussion in the following half-day seminar. http://www.heritage.org/events/2016/10/cybersecurity I particularly recommend the opening session with Michael Hayden, who makes a number of interesting and thoughtful observations.

The level of discussion, which is to say the lack of serious discussion of these issues, in the American Presidential campaign is distressing. I am reassured that some very bright and thoughtful people are discussing them. In addition to the Heritage seminar cited above, the New American Foundation recently held an all day seminar on these issues that started off with an excellent presentation by Andrew J. Bacevich (starting at about 24 minutes into the video)

https://www.newamerica.org/international-security/events/next-presidents-fight-against-terror/

We can not remind ourselves often enough that “the price of liberty is eternal vigilance.” And, we should add, courage.

Strengthening National Security

On March 10, Edward Snowden was interviewed via videoconference at the annual conference of SXSW Interactive: “Conversation with Edward Snowden” It is an absolutely brilliant discussion of the issues first raised by Snowden last year with emphasis on protecting our privacy. I had not viewed it yet when I posted my last blog on the slippery slop of government expansion, but it provides another powerful set of examples. I strongly urge anyone to view it who is interested in and concerned about how to strengthen our security against criminals and enemies without eroding the checks and limits on the scope and power of our government that is one of the foundations of our successful democracy built into our constitution.

Snowden is surprisingly articulate. He understands economics almost as well as cryptology. I will repeat here just two of the many brilliant points he made and urge you to watch it all.

No one in the discussion of surveillance and national security raised by Snowden wishes to impede the ability of the NSA or the government to gather information on targeted individuals under court orders with proper oversight. Sounding like an economist (and of course we all love economists) Snowden notes that the billions of dollars that have been wasted on mass (as opposed to targeted) data collection and analysis (it has produced virtually no useful information) has taken valuable resources away from improving the collection and analysis of targeted information. Thus, for example, the underwear bomber and the Boston marathon bombers probably could have been stopped if our government had used its intelligence resources more wisely. In short, mass surveillance programs have reduced our security in many ways.

When asked why the NSA and other government security agencies persist in hanging on to worthless and wasteful (and potentially dangerous) programs, Snowden presents a proper public choice answer that is very similar to the special interest defense of wasteful and harmful tax loop holes I criticized a few days ago. Individuals and companies benefit from the huge amounts spent on these programs. They acquire a self-interest in their preservation. In addition, bureaucrats are naturally self-protective and slow-moving. You really should listen to Snowden’s own words.

As I have said a number of times previously, the disclosures of confidential government documents and internal discussions by Chelsea (AKA Bradley) Manning are harmful to the effective functioning of government. I am glad that she is in jail, though a hospital would probably be more appropriate. Snowden, on the other hand is a full-blown hero and patriot. It took me a while to fully embrace this view, but it is clear now that our personal and national security have already improved and should improve further in the future because of him (and others working in the same direction). I am very grateful for the huge personal sacrifice he has made for me and for our country. I hope that our government will find a way to welcome him back home soon.

The Year of Edward Snowden

I am increasingly in awe of what Edward Snowden, at great personal risk, has done for our country. One of the three original journalists to whom he gave documents, Barton Gellman, has written the following article for the Washington Post. Edward Snowden after months of NSA revelations says his missions accomplished/2013/12/24  Every American who cares about the future of our country should read it. I have blogged a number of times this year about Snowden if you would like to read more.

Some people confuse the technical and legal ability to collect personal information about targeted individuals under well-developed controls, with the data mining searches for needles in haystacks Snowden exposed. Here are just two of his statements from the article:

“I don’t care whether you’re the pope or Osama bin Laden. As long as there’s an individualized, articulable, probable cause for targeting these people as legitimate foreign intelligence, that’s fine. I don’t think it’s imposing a ridiculous burden by asking for probable cause. Because, you have to understand, when you have access to the tools the NSA does, probable cause falls out of trees.”

“I believe the cost of frank public debate about the powers of our government is less than the danger posed by allowing these powers to continue growing in secret,”

Snowden likened the NSA’s powers to those used by British authorities in Colonial America, when “general warrants” allowed for anyone to be searched. The FISA court, Snowden said, “is authorizing general warrants for the entire country’s metadata.”

More on the balance between the public and private sectors

Private sector rights.

I strongly support the right of the Boy Scouts of America’ to define who it will accept as members (i.e. its right to exclude gays). I don’t have to agree with how people use their freedom to believe passionately in their right to be free including who they join with in clubs. I was happy to see that organization relax its rules and open its doors to gay boys. But that door was not opened very wide and the BSA still has a way to go. I was thus very happy to see Lockheed-Martin end its donations to the Boy Scouts until remaining discriminations are ended.

Richard “Guglielmetti, 66, who led Troop 76 in Simsbury, Conn., for a dozen years until 2005, said leaders and members of his troop ignored the national organization’s prohibition on gays as scouts or leaders because they felt it was wrong.” (US Today, January 28, 2013)  It would have been counterproductive and morally wrong in my view for the government to have forced this result or to push it further.

As another example, Duck Dynasty star Phil Robertson (I never heard of him) said some perfectly ignorant and offensive things about gays. We should all defend his right to say what he wants to. We should also defend the right of A&E to suspend his show, though I am not particularly happy about mixing up commerce and politics or moral issues. Fortunately, A&E is a cable show. Cable programs are not subject to the government regulations covering over-the-air shows and are free to pretty much do what they want. This helps explain why cable shows are often much more interesting.

A process of public discussion and education best sorts out touchy issues such as these. The government is not needed or wanted here.

Domestic spying

Whistle blower Edward Snowden received further confirmation of the legitimacy of his belief that the government has over reached in its domestic personal data collection (see my several earlier blogs on this subject). In ruling that NSA’s massive metadata collection for all domestic phone calls (numbers called, date/time, and duration) was unconstitutional, Federal Judge Richard J. Leon stated that the government had failed to “cite a single instance in which analysis of the NSA’s bulk metadata collection actually stopped an imminent attack.” (Washington Post, December 20, 2013).

Equally damning was the just released report of a panel appointed by President Obama to investigate charges of NSA abuse, which included among its members former deputy CIA director Michael J. Morrell. The review panel said the program “was not essential to preventing attacks and could readily have been obtained in a timely manner using conventional [court] orders.”

Snowden has performed an enormous public service at great personal risk. Thank you Mr. Snowden

Maybe our ship is starting to right itself.

Cell Phones on Planes: A Defining Issue

The Federal Communications Commission is moving towards allowing the use of cell phones on airplanes. Many of us have known for a long time that their use poses no safety issues (yes the government does sometimes—how shall I say it in a way that will not attract NSA attention—misrepresent things). The FCC’s ruling rests on whether it would be good or nice for us to be able to use them. Whether we want our government to establish rules on what is nice public behavior is one of those issues that help define and reflect differing attitudes toward the desirable (not to mention, because it seems largely irrelevant these days, constitutional) role of government.

As I write this note, it seems that the FCC is moving towards a compromise ruling that would allow the use of phones and other electronic devises (Mac, iPad, etc – yes I am an Apple fan) for internet access to email, text messages, and web surfing but not talking. This strikes me as odd in that it has been possible to do that for some years now. I have used the service (for a fee) to send and receive email on Delta and other planes with the equipment: http://www.gogoair.com/gogo/splash.do. Oh well.

I cringe when people base their views on whether government should control certain behaviors (pot smoking, public profanity, talking lauding in public etc) on whether such behavior is good or bad for the person doing it. For me the test (along with the constitution) is whether my behavior endangers other people. Thus the issue of whether secondary smoke is harmful and if so should be banned in the workplace, for example, is a legitimate public policy concern. The outcome should rest on the facts; is it harmful to third parties or not.

I would not like for people to talk on their cell phones on planes, but am appalled by the idea that the government would not allow airlines to set their own policies in this regard. I don’t like talking on planes in any form. I have not talked to anyone on a plane other than the flight crew for many years. No government ruling caused this or is desired. Somehow I have been able to successfully and without words communicate to anyone next to me that I do not want to talk. My loss, I am sure, but it is fortunately still my choice.

I am reminded of a flight home from a wonderful European vacation with my son, Brandon, years ago. The man and woman behind us were chattering away and their conversation became more and more homophobic. My son finally turned around and said, “Would you please shut up.”  Those lobbying the FCC to forbid phone calls on planes should probably include fines for offensive speech on planes or in other public places (the First Amendment be damned). Those, like me, who prefer a more limited, less intrusive government, prefer to rely on common courtesy as it evolves through private interactions. Perhaps because I am the oldest of my siblings I never liked the idea of a Big Brother.

Spying

Two articles on the same page of Tuesday’s Washington Post reported on similar activities from opposite perspectives. In one, “A 28-year-old British man whom prosecutors described as a ‘sophisticated and prolific computer hacker’ has been charged in connection with cyberattacks in which he illegally accessed the personal information of U.S. soldiers and government employees, and obtained other information about budgets, contracts and the demolition of military facilities, authorities said Monday.” Why did he do it? Why do such people do such things? For commercial/financial gain? In this case, it seems, the motivation was political, though I am not sure what the political point was. “British-man-described-as-prolific-hacker-indicted-in-cyberattacks-on-us-agencies/2013/10/28/”

The second article discussed the NSA program to eavesdrop on friendly heads of state, such as German Chancellor Angela Merkel, launched in 2002. President Obama apparently did not know the extent and details of such surveillance until very recently nor did Sen. Dianne Feinstein, who oversees the NSA as the Senate Intelligence Committee chair. Why did they do it? “Their [NSA staff] job is to get as much information for policymakers as possible,” a senior administration official said. “They’re used to coming at this from the other direction — that is, being criticized for not knowing enough. This is a new dynamic for them.” “Obama-didnt-know-about-surveillance-of-us-allied-world-leaders-until-summer-officials-say/2013/10/28/”

In the first case, we were angry and in the second case Chancellor Merkel and most of Europe were angry and both with good reasons. We want our intelligence agencies to collect all of the information needed to protect us from harm. All countries spy on each other, but the tools and activities of espionage agents are potentially double-edged swords. Because of the potential dangers of turning these tools on our own citizens (and friends) for political advantage, strict limits have been placed on domestic surveillance and our allies might have assumed they were spared as well.  Unfortunately following the 9/11 attacks many American’s were more concerned about security than privacy and liberty and willing to move the balance away from protecting privacy.

When these systems of spying were first developed, those using them had (I assume) the best of intentions—gathering information from and on enemies to help protect the nation. And this is exactly what we wanted from them. Whether it is really possible to detect useful information from the millions upon millions of messages (verbal and electronic) being collected is an interesting question, however. Targeting specific individually is dramatically easier than looking for needles in massive data haystacks, but the heads of state of our allies?

Those who work for the NSA and other intelligence agencies are surely motivated by the highest objectives. But what do good people do when they have such access to information on the private activities of those they don’t like politically—republican’s able to browse around in the private affairs of democrats and visa versa?  IRS agents abusing their power against Tea Party organizations comes to mind, for example. Snowden has shown us that as time has gone on the temptation to use more widely the enormous capability available to our intelligence agencies has grown. And not one hundred present of our government officials are always honorable to begin with.  In the following article in The Washington Post, Harold Meyerson quotes the WSJ as follows: “The agency [NSA] has been rebuked repeatedly by the Foreign Intelligence Surveillance Court for misrepresenting the nature of its spy programs and for violating the court’s confidential orders.” “A-turbulent-spy-agency/2013/10/29/”

On top of this, the government’s insistence that American Internet access providers and large data collectors leave back doors through which the NSA can enter to collect data, has reduced Net security against the likes of the British hacker mentioned in my opening paragraph. Fortunately, once again, when things go too far there is a backlash. Even Senator Feinstein is saying stop.

Turning a corner on the invasion of privacy?

In a small step to improve transparency, the U.S. government has released a two-year-old opinion by its secret Foreign Intelligence Surveillance Court revealing that “the National Security Agency unlawfully gathered tens of thousands of e-mails and other electronic communications between Americans” The Washington Post, Aug 22, 2013. Perhaps it was pushed to preempt Edward Snowden from doing so before it did. But it was also in response to a year old Freedom of Information lawsuit by the Electronic Frontier Foundation.

“It’s unfortunate it took a year of litigation and the most significant leak in American history to finally get them to release this opinion,” said foundation staff attorney Mark Rumold, “but I’m happy that the administration is beginning to take this debate seriously.”

In the October 3, 2011, opinion, John D. Bates, then the surveillance court’s chief judge, wrote: “The court is troubled that the government’s revelations regarding NSA’s acquisition of Internet transactions mark the third instance in less than three years in which the government has disclosed a substantial misrepresentation regarding the scope of a major collection program…. NSA’s knowing acquisition of tens of thousands of wholly domestic communications through its upstream collection is a cause of concern for the court.” Bates also noted that the court’s authorization of the NSA’s bulk collection of Americans’ phone-call records was “premised on a flawed depiction of how the NSA” uses the data. “This misperception by the FISC existed from the inception of its authorized collection in May 2006, buttressed by repeated inaccurate statements made in the government’s submissions, and despite a government-devised and court-mandated oversight regime.”

That is a mouth full and it is encouraging that the government has finally shared the court’s opinion with the public. It is in sharp contrast with the disclaimers of any wrong doing it was issuing a few weeks ago.