Cyber‐​Surveillance in the Wake of 9/11

October 19, 2001 • Commentary

Among the many questions in the wake of the September 11 terrorist attack is what additional steps could have been taken on the cyber‐​security front to prevent this tragedy from occurring. Could government’s increased use of cyber‐​surveillance technologies have helped?

“Cyber‐​snooping” has been the subject of debate in recent years between the law enforcement community and many privacy advocates who seek to secure their right of free speech and to guard against “unreasonable searches” that new technologies make easier. The fears of both sides are well‐​founded.

Technologies exist that allow law officials to eavesdrop on voice and electronic communications, as well as match peoples’ faces with those in a database as they pass by cameras. Since the potential for the “eye in the sky” exists, the challenge is to assure that citizens enjoy the same protection from unwarranted surveillance that they’ve been accustomed to since the Bill of Rights was passed.

It’s important to note with respect to the coordinated terrorist attack that it was not an Internet crime per se. It could have taken place without coordination across the Internet. Information coordination is one aspect of a complex cascade of “what ifs” that encompass flimsy doors, cosmetic security checks, flight‐​school background checks, the fact that terrorists lived among us for years, foreign policy itself, and endless other second‐​guessing.

Law enforcement wants to ensure it has the tools to do its job. But here’s the dilemma. Part of that arsenal, they argue, must be not just traditional telephone wire‐​tapping systems, but new digital wire‐​tapping and e‐​mail tracing systems, and even wireless eavesdropping technologies and “key stroke logging.” This latter tool allows law enforcement to install a hidden device in a suspect’s computer to record and monitor the words and sentences he types. Other technologies likely exist that are unknown to the public. Law enforcement argues it needs to use these technologies to make credible threat assessments before the bad guys can strike.

On the other hand, privacy advocates and many civil libertarians argue that these cyber‐​surveillance efforts can go too far and threaten the liberties of innocent parties. Why should law enforcement be given open‐​ended authority to engage in cyber‐​snooping of its fellow citizens? Are we forgetting about the Fourth Amendment, “The right of people to be secure in their persons, houses, papers, and effects, against unreasonable search and seizures, shall not be violated…”?

The truth is somewhere in‐​between and turns on the phrase “open‐​ended.” The authority of law enforcement to use surveillance technologies must not be open‐​ended. How much liberty are we willing to give up to guarantee the safety of our cities and homes? No one would feel comfortable knowing the FBI and CIA had carte blanche authority to listen in to telephone conversations or e‐​mail communications in an attempt to unearth parties discussing hostile activities.

In addition to the insult to privacy and the ability to comfortably speak one’s mind, driftnet‐​style surveillance could lead to innumerable misunderstandings and errors. An endless amount of voice or electronic chatter involves casual talk that might be construed to be dangerous. Teenagers often use euphemisms or slang like, “It’s the bomb” to describe a favorite song or artist. And during fits of anger, many adults are prone to utter — or type in an email — “I’m going to kill him,” though they don’t mean it.

Part of the answer is to ensure that government can’t comb our communications in a blanket manner anytime it feels the urge. The delicate balancing act between the equally important values of liberty and security will require a renewed focus on what constitutes an “unreasonable search and seizure” in the world of seamless communications. Governments must acquire clearances equivalent to those that they must secure in the non‐​digital world.

In that sense, nothing has changed (or should change) in cyberspace. “Probable cause” in terms of issuing warrants still has meaning. We must debate how broadly or narrowly search warrants should be tailored when they are issued. But given information that has emerged, it is clear that government would have had no trouble securing the necessary clearance to execute surveillance against those implicated in the WTC/​Pentagon outrage. Indeed, no one is outraged that government was doing that.

The new debate over cyber‐​surveillance seems to stem from the fact that technology, while it frees us from physical constraints, does the same for those who wish to do harm. But the answer is not to sacrifice the civil liberties of citizens to safeguard citizens from terrorists. There is a balance between security and freedom that Americans must maintain with vigilance and self‐​reliance.

About the Authors