Item Details
Skip Navigation Links
   ActiveUsers:1431Hits:19130507Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Journal Article   Journal Article
 

ID130991
Title ProperSecurity and the claim to privacy
LanguageENG
AuthorAmoore, Louise
Publication2014.
Summary / Abstract (Note)When US President Barack Obama publicly addressed the data mining and analysis activities of the National Security Agency (NSA), he appealed to a familiar sense of the weighing of the countervailing forces of security and privacy. "The people at the NSA don't have an interest in doing anything other than making sure that where we can prevent a terrorist attack, where we can get information ahead of time, we can carry out that critical task," he stated. "Others may have different ideas," he suggested, about the balance between "the information we can get" and the "encroachments on privacy" that might be incurred (Obama 2013). In many ways, conventional calculations of security weigh the probability and likelihood of a future threat on the basis of information gathered on a distribution of events in the past. Obama's sense of a trading-off of security and privacy shares this sense of a calculation of the tolerance for the gathering of data on past events in order to prevent threats in the future. In fact, though, the very NSA programs he is addressing precisely confound the weighing of probable threat, and the conventions of security and privacy that adhere to strict probabilistic reasoning. The contemporary mining and analysis of data for security purposes invites novel forms of inferential reasoning such that even the least probable elements can be incorporated and acted upon. I have elsewhere described these elements of possible associations, links, and threats as "data derivatives" (Amoore 2011) that are decoupled from underlying values and do not meaningfully belong to an identifiable subject. The analysis of data derivatives for security poses significant difficulties for the idea of a data subject with a recognizable body of rights to privacy, to liberty, and to justice.
Consider, for example, two years before the controversies surrounding NSA and the PRISM program, when the US Director of National Intelligence, James Clapper, testified before the joint hearing of committees on the virtues of the algorithmic piecing together of fragments of data:
`In' analytical NoteInternational Political Sociology Vol.8, No.1, March 2014: p.108-112
Journal SourceInternational Political Sociology Vol.8, No.1, March 2014: p.108-112
Key WordsSecurity ;  United States - US ;  Privacy ;  Countervailing Forces ;  Tolerance ;  Foreign Intelligence and Surveillance - FISA ;  US National Security Agency - NSA ;  National Policy ;  National Security ;  PRISM ;  Surveillance Programs ;  Political Role ;  International Relations - IR ;  International Cooperation - IC