<< Chapter < Page Chapter >> Page >

The next frontier of privacy issues may well be the increased use of drones, small preprogrammed or remotely piloted aircraft. Drones can fly virtually undetected and monitor events from overhead. They can peek into backyards surrounded by fences, and using infrared cameras they can monitor activity inside houses and other buildings. The Fourth Amendment was written in an era when finding out what was going on in someone’s home meant either going inside or peeking through a window; applying its protections today, when seeing into someone’s house can be as easy as looking at a computer screen miles away, is no longer simple.

In the United States, many advocates of civil liberties are concerned that laws such as the USA PATRIOT Act (i.e., Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act), passed weeks after the 9/11 attacks in 2001, have given the federal government too much power by making it easy for officials to seek and obtain search warrants or, in some cases, to bypass warrant requirements altogether. Critics have argued that the Patriot Act    has largely been used to prosecute ordinary criminals, in particular drug dealers, rather than terrorists as intended. Most European countries, at least on paper, have opted for laws that protect against such government surveillance, perhaps mindful of past experience with communist and fascist regimes. European countries also tend to have stricter laws limiting the collection, retention, and use of private data by companies, which makes it harder for governments to obtain and use that data. Most recently, the battle between Apple Inc. and the National Security Agency (NSA) over whether Apple should allow the government access to key information that is encrypted has made the discussion of this tradeoff salient once again.

All this is not to say that technological surveillance tools do not have value or are inherently bad. They can be used for many purposes that would benefit society and, perhaps, even enhance our freedoms. Spending less time stuck in traffic because we know there’s been an accident—detected automatically because the cell phones that normally whiz by at the speed limit are now crawling along—gives us time to spend on more valuable activities. Capturing criminals and terrorists by recognizing them or their vehicles before they can continue their agendas will protect the life, liberty, and property of the public at large. At the same time, however, the emergence of these technologies means calls for vigilance and limits on what businesses and governments can do with the information they collect and the length of time they may retain it. We might also be concerned about how this technology could be used by more oppressive regimes. If the technological resources that are at the disposal of today’s governments had been available to the East Germany Stasi and the Romanian Securitate, would those repressive regimes have fallen? How much privacy and freedom should citizens sacrifice in order to feel safe?

The interrelationship of constitutional amendments continues to be settled through key court cases over time. Because it was not explicitly laid out in the Constitution, privacy rights required clarification through public laws and court precedents. Important cases addressing the right to privacy relate to abortion, sexual behavior, internet activity, and the privacy of personal texts and cell phone calls. The place where we draw the line between privacy and public safety is an ongoing discussion in which the courts are a significant player.

Abraham, Henry J. 2003. Freedom and the Court . New York: Oxford University Press.

Ackerman, Bruce. 2007. Before the Next Attack: Preserving Civil Liberties in an Age of Terrorism . New Haven, CT: Yale University Press.

Bilder, Mary Sarah. 2008. The Transatlantic Constitution: Colonial Legal Culture and the Empire . Cambridge, MA: Harvard University Press.

Carter, Barton T., Marc A. Franklin, and Jay B. Wright. 1993. The First Amendment and the Fifth Estate: Regulation of Electronic Mass Media . Westbury, NY: Foundation Press.

Domino, John C. 2002. Civil Rights and Liberties in the 21st Century , 2nd ed. New York: Longman.

Garrow, David J. 1998. Liberty and Sexuality: The Right to Privacy and the Making of Roe v. Wade . Berkeley: University of California Press.

Levy, Leonard. 1968. Origins of the Fifth Amendment: The Right Against Self-Incrimination . New York: Oxford University Press.

Lewis, Anthony. 2007. Freedom for the Thought That We Hate: A Biography of the First Amendment . New York: Basic Books.

Lukianoff, Greg. 2002. Unlearning Liberty: Campus Censorship and the End of American Debate . New York: Encounter Books.

Schwarz, John E. 2005. Freedom Reclaimed: Rediscovering the American Vision . Baltimore: John Hopkins University Press.

Waldman, Michael. 2015. The Second Amendment: A Biography . New York: Simon&Schuster.

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, American government. OpenStax CNX. Dec 05, 2016 Download for free at http://cnx.org/content/col11995/1.15
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'American government' conversation and receive update notifications?

Ask