You are on page 1of 4

Rozsa 1

Rozsa, George Gregory


English 3182
September 15, 2015
Leviathan
And I stood upon the sand of the sea, and saw a beast rise up out of the sea,
having seven heads and ten horns, and upon his horns ten crowns And it was
given unto him to make war with the saints, and to overcome them: and power
was given him over all kindreds, and tongues, and nations.1
Leviathan just might be an apt metaphor for the Department of Homeland Security 2;
although, in Thomas Hobbes example, Leviathan is an external threat for whom we (as men in a
naturalread violentstate of nature) must surrender certain liberties and freedoms to a
sovereign that can protect us from Leviathan and ensure our safety. Such presumptions of said
protection became tenuous, however, in the wake of the September 11, 2001 [attacks]. In
response to these attacks, Congress passed and President George W. Bush signed into law the
USA Patriot Act, thus authorizing an extensive surveillance apparatus designed to thwart
terrorism directed at the United States and its interests abroad.
PRISM, a NSA covert operation designed to extract electronic information directly from
U.S. internet-based company servers, was launched from the ashes of President George W.
Bushs secret program of warrantless domestic surveillance in 2007 (Washington Post), to shore
up perceived deficiencies in the FISA warrant process, which limited the agencys tracking of
potential terrorist suspects (Guardian). According to The Guardian, PRISM circumvents FISA
law by enabling the NSA to obtain private communications directly from participating
companies, without having to request them from the service providers and without having to
obtain individual court orders (Guardian). Notwithstanding official company denials, classified
NSA documents leaked to The Washington Post by Eric Snowden list Microsoft, Google, Yahoo,
Facebook, PalTalk, YouTube, Skype, AOL, and Apple as Current Providers from whom the
agency collects and stores such confidential communications as e-mail, chats, videos, photos,
VoIP, stored data, logins, network connections, etc. (Washington Post).

Revelation 13:1,7 http://www.kingjamesbibleonline.org/Revelation-Chapter-13/


The Department of Homeland Security (DHS) possesses seven heads of its own: Transportation Security
Administration, U.S. Customs and Border Protection, U.S. Citizenship and Immigration Services, U.S. Immigration
Customs Enforcement, U.S. Secret Service, Federal Emergency Management Agency, and U.S. Coast Guard.
2

Rozsa 2
James R. Clapper, Director of National Intelligence, claims that information collected
under this program is among the most important and valuable foreign intelligence information
we collect, and is used to protect our nation from a wide variety of threats (Washington Post).
Clappers appeal to national security underscores the Faustian bargain at the heart Hobbes
Leviathanthe trade-off between individual freedom (represented here in the form of privacy)
and perceived security (in the NSAs ability to monitor and thwart future terrorist attacks from
the data obtained through the surrender of such privacy). Marcus Yallows father in Cory
Doctorows Little Brother represents the type of individual who is willing to sacrifice privacy for
security. "They may not have caught any terrorists yet, but they're sure getting a lot of scumbags
off the streets, Marcus father intimates, If you dont have anything to hide (45).
And that appears to be a common refrain of those individuals willing to trade privacy for
security, if you do not have anything to hide then you have nothing to fear. But as Doctorow
shows us, Marcus was detained by the San Francisco Police Department because of his
anomalous movements. Weve been watching you since you left the BART, one officer tells
Marcus, Your Fast Pass says that youve been riding to a lot of strange places at a lot of funny
hours (Doctorow 40). Involuntary as well as voluntary surveillance runs the risk of degenerating
into a police state where individuals are detained simply because the state cannot comprehend
what it deems as irrational behavior. Notwithstanding these detentions nor any detention,
surveillance has the tendency to alter ones actions simply by being internalized. This is also
known as self-policing. And this works on the individual whether one has something to hide or
not.
Then there is the whole issue of the false positive paradox. Even if the NSAs surveillance
program was 99% effective, In a city of twenty million like New York, Marcus says, a 99
percent accurate test will identify two hundred thousand people as being terrorists (Doctorow
47). The problem, Marcus notes, is that only ten of them are terrorists. To catch ten bad guys,
you have to haul in and investigate two hundred thousand innocent people (Ibid). Under this
logic, the semblance of security necessarily results in insecurity for a large swatch of the
population, the bulk of whom already resides on the margins of society, which brings me to the
question of why.
When I first heard of the NSAs data collection program, I was skepticalnot that I did not
believe they were collecting as much data as they were, but I have been following a number of
Big Data conferences around the country and I just do not believe we have the capability of

Rozsa 3
processing that much data. So why collect it? And more importantly, why leak it? Perhaps
Doctorow gives us a reason. Marcus fathers explanation of Bayesian analysis leads Marcus to
the conclusion that while the DHS cannot tell whos passing Xnet packets by looking at the
contents of those packets [they] can find out who is sending way, way more encrypted
traffic than everyone else (Doctorow 41). And then I think of that long stretch of highway
between Los Angeles and Las Vegas. I think of those Highway monitored by radar signs. This
stretch of lonely highway has not been monitored by radar since the 1970s. And no one takes
them seriously, but back in the day, we did. We internalized the warning and slowed down even
as we knew we were all alone on that desert road. Leaking the NSAs data mining and collection
programs will inevitably steer those individuals seeking to circumvent the program down
anomalous corridors and alleyways where their irregularities can be identified. Subsequently
going back to the haystack with a target in hand is much more effective than the nearly
impossible task of trying to locate the target from within haystack itselfand I, I took the one
less traveled by and that has made all the difference.

Rozsa 4
Works Cited
Doctorow, Cory. Little Brother. New York: Tor, 2008. Print.
Gellman, Barton and Laura Poitras. U.S. British Intelligence Mining Data from U.S. Internet
Companies in Broad Secret Program. The Washington Post 7 June 2013. mining-datafrom-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf11e2-8845-d970ccb04497_story.html.
Greenwald, Glenn and Ewen MacAskill. NSA Prism Program Taps in to User Data of
Apple, Google and Others. The Guardian 7 June 2013. http://www.theguardian.com/
world/2013/jun/06/us- tech-giants-nsa-data.

You might also like