SEPTEMBER 2021 | LAW WISE 5
Privacy in the Digital Age The surveillance capabilities through the use of big data, artificial intelligence, and facial recognition software, among various existing technologies, have provided governments and intelligence agencies with an unprecedented ability to monitor their citizens. The potential threat to privacy has prompted global organizations to take notice. In 2018, the UN Rapporteur on the Right to Privacy issued a 38-page “Draft Legal Instrument on Government-led Surveillance and Privacy.” The Draft states, “Surveillance needs to be limited to what is necessary and proportionate while states need to be able to guarantee a safe and secure environment.” The difficulty lies in determining the formula which allows for a proportionate response respecting both privacy and safety within a particular environment. Contemporaneously with the UN Rapporteur Draft, the University of Montreal developed their Declaration for Responsible AI Development. The third segment of this Declaration, titled Protection of Privacy and Intimacy Principle, enumerates an eight-point process to protect individuals from “AIS intrusion and data acquisition and archiving systems (DAAS).” The dangers from surveillance are real and have potentially grave consequences when abused. Organizations like Human Rights Watch note how the rights of women and LGBTQ+ individuals can be violated through surveillance that attempts to monitor what the state defines as immoral behaviors like “extramarital and homosexual sex.” According to reporting from the New York Times, the assassination of Jamal Khashoggi involved Saudi Arabian officials using Pegasus spying software to eavesdrop on Khashoggi prior to his death.
this data from Carpenter’s cell phone companies. This data allowed authorities to place Carpenter within a radius of a half-mile to two miles of the location of the robberies. In his defense, Carpenter claimed the government violated his Fourth Amendment rights because they did not obtain a warrant to retrieve this information. However, the authorities did have authority through a federal law known as the Stored Communications Act. The standard to obtain this data through federal law is easier than the Fourth Amendment requirements. According to the Act, disclosure of telecommunications records is allowed when “specific and articulable facts show... that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation.” The case, Carpenter v. United States (2017), hinged on what expectation of privacy exists when a third party is involved. Justice Kennedy felt these cell phone records remained less sensitive than banking information, which can be obtained without a warrant. The argument is that by using your cell phone and accessing a cell tower of your chosen provider, that record created by the provider diminishes your expectation of privacy. Justice Sotomayor argued average citizens do not want the government to know where they are at all times. The Carpenter case demonstrates the difficulty of defining privacy under the Fourth Amendment, which was established in an age that would never have imagined the today’s digital world. Though not taking sides, several of the major technology companies filed a friend-of-the-court brief asking for updated standards and guidance on this issue.
Much of the attention given to this issue originated with the 2013 revelations by the former CIA and NSA analyst, Edward Snowden. The desire to encrypt and protect sensitive digital information and to fight back against surveillance and warrantless intrusions exploded because of Snowden’s disclosure of the extent of spying by the United States and other intelligence agencies around the world. Government surveillance against potential terrorism remains an important and noble goal. Nevertheless, we must safeguard our privacy, even when this safeguarding protects criminal behavior. In 2011, police arrested Timothy Carpenter for a series of robberies of Radio Shack and similar stores in the Detroit area. At his trial, the government introduced evidence called “cell phone location data.” The government obtained
www.ksbar.org/lawwise