OTHER ISSUES

Freedom Magazine. The 2016 Expansion issue cover
December 2016 Special Edition
Freedom Magazine. The Shocking Truth issue cover
October 2016
Vol. 48, Issue 3
Freedom Magazine. Military Spending issue cover
June-July 2016
Vol. 48, Issue 2
Freedom Magazine. Pill Pushers issue cover
April-May 2016
Vol. 48, Issue 1
Freedom Magazine. Back to School issue cover
September 2015
Vol. 47, Issue 8
Freedom Magazine. Veterans issue cover
August 2015
Vol. 47, Issue 7
Freedom Magazine. Infrastructure issue cover
July 2015
Vol. 47, Issue 6
Freedom Magazine. Net Freedom issue cover
June 2015
Vol. 47, Issue 5
Freedom Magazine. Patriot Games issue cover
May 2015
Vol. 47, Issue 4
Freedom Magazine. Freedom of Information Act issue cover
April 2015
Vol. 47, Issue 3
Freedom Magazine. People Who Read Are a Dying Breed issue cover
March 2015
Vol. 47, Issue 2
Get Religion? issue cover
February 2015
Vol. 47, Issue 1
Freedom Magazine. Scientology Expansion issue cover
December 2014 Special Edition
Freedom Magazine. Held Back issue cover
November 2014
Vol. 46, Issue 4
Freedom Magazine. Created Equal issue cover
October 2014
Vol. 46, Issue 3
Freedom Magazine. LA Under the Influence issue cover
September 2014
Vol. 46, Issue 2
Military: Are They Drugged to Death issue cover
August 2014
Vol. 46, Issue 1

FLORIDA ISSUES

Freedom Magazine. The Year in Review issue cover
December 2016
Clearwater Special Edition
Freedom Magazine. Clearwater Building cover
Special Clearwater Edition.
August 2015
Freedom Magazine. Building a Great City issue cover
Florida.
Vol. 20, Issue 1
Freedom Magazine. Flag issue cover
July 2014
Special Edition
PUBLISHED BY
Church of Scientology
since 1968
SHARE

Sean Lawson A communications professor worries about the NSA’s obsession with data.

by

When most of us think about government surveillance, we tend to have an image of someone watching us on camera, reading our emails as they’re typed or listening to our phone conversations. The idea of “surveillance after the fact” usually doesn’t cross our minds.

As an associate professor of communications at the University of Utah in Salt Lake City, Sean Lawson spends quite a bit of time pondering the concept. After all, he lives and works just 25 miles from the Utah Data Center, a sprawling National Security Agency (NSA) campus that epitomizes retroactive surveillance.

Sean Lawson

“The idea of the government collecting and storing massive amounts of information about people does rub up against the core principles and values that this country was founded on.”

—Sean Lawson

Located near a National Guard training site in the Salt Lake Valley town of Bluffdale, the NSA facility boasts one of the largest arrays of computer servers anywhere for storing metadata on every phone call, text message, email and social media interaction since the September 11, 2001, terrorist attacks on America.

“You might not be of interest to the government right now, but in the future maybe you will be,” says Lawson, who majored in Arab Studies at Georgetown University and studies the effects of science and technology on military doctrines and strategies. “Maybe you’ll be accused of a crime or you’ll come into the government’s focus for some other reason, such as political activism.”

As Lawson sees it, the danger of the NSA’s penetrating, all-pervasive surveillance of citizens lies in the fact that the agency has an archive of everybody’s life—everything they’ve ever done electronically, down to the details of their grocery purchases. All of it, Lawson worries, can be mined by the government in an ostensible effort to fight terrorism.

“The idea of the government collecting and storing massive amounts of information about people does rub up against the core principles and values that this country was founded on,” says Lawson. “But just from a practical standpoint, I wonder how effective all the data collection really is and if it’s even necessary.”

Lawson points to the conclusions of two independent commissions on NSA reform, including one by a 2013 White House review group, which found that not only was the agency’s collection of telephone metadata in violation of the law (and potentially also of the Constitution), but also that the program has never made any impact on countering terrorism.

Lawson’s interest in the potentially negative impact of government policy goes back to his boyhood in California’s San Francisco Bay Area. It was there that he first learned about the destructive power of nuclear weapons, not least because his father worked on the U.S. nuclear weapons program at the nearby Lawrence Livermore National Laboratory. Dinner-table conversations at the Lawson home frequently revolved around the profound impact of technology on human conflict.

“That sparked in me an interest in the implications of other kinds of technologies and weapons,” says Lawson, who is the author of Nonlinear Science and Warfare: Chaos, Complexity and the U.S. Military in the Information Age, a 2013 book recently translated into Chinese.

A small but significant movement in the intelligence world has been pushing for some years now for greater amounts of human intelligence rather than the electronic collection of massive amounts of data, according to Lawson. “I don’t think we need to go back to a romanticized world of covert agents like James Bond,” he says. “But there is some merit to the idea that we’re maybe too enamored of technology.”

One of the problems with the NSA is that “on the one hand they’re the organization that has the most expertise on cybersecurity issues,” Lawson says. “But on the other hand they have an organizational mission that works against cybersecurity because their mission is espionage—to break into communications systems and spy on other people.”

So, Lawson explains, to some extent the NSA has a vested interest in not promoting cybersecurity. That way the agency can continue to use vulnerabilities in cybertechnology to promote its main mission.

Because cyberattackers (the bad guys) and cyberdefenders (the good guys, including everyday consumers and companies) use the same information technology, there has long been a fundamental tension between cyberattacks and cyberdefense.

The NSA refers to this as the “equities issue”—when the agency discovers a vulnerability in a technology or system, it has two options: The first is to alert the manufacturer (or private-sector consumer) and help fix the vulnerability, thereby protecting both cyberdefenders and cyberattackers. The other option is to keep quiet in the hope of catching the bad guys, but also leaving the good guys insecure.

As Lawson puts it: “The NSA doesn’t necessarily let private companies know in a timely manner that their products have vulnerabilities because the NSA wants to exploit them for espionage purposes.”

The Cybersecurity Information Sharing Act of 2015 requires the Director of National Intelligence, who oversees the NSA, to develop procedures to share cybersecurity threat information with private entities—unless the information is deemed too valuable to disclose in the interests of national security.

But there’s the rub: It is unclear “how big the space is for exceptions,” says Lawson.