Professional Documents
Culture Documents
Matthew Theorell
English 1101
4 December 2018
ever truer as available information increases at an exponential rate thanks to computers and the
internet. We the people continue to use technology to our advantage at the cost of information
being gathered about us. From home cameras to shopping habits, our digital profiles are held by
the companies that run these services. This information can be used to protect people and deliver
justice if it is used properly and has limitations on its acquisition. The government should have
the right to demand users’ data from companies if the demand for the data is backed by a court
issued warrant, the subject of the companies’ user data is in the bounds of government
jurisdiction, and that the information gathered is respectful of the privacy of the owners whose
In contrast, some would say that the government should never have access to user data.
“Data could be misused by governments, especially repressive regimes that could use them as
backdoors to conduct mass surveillance on a planetary scale” (Leetaru, 4). Such access
engenders power and leverage. Thus, whenever the chance is given, the government will try to
gather information. An example of this is Project SHAMROCK, which was an operation started
in the 1940’s by the NSA to secretly collect and read telegraph messages without a warrant that
passed through the cable that ran under the Atlantic Ocean. This operation went on for decades
until it was shut down after it was exposed by the Church Committee in the 1970’s (Daskal, 11).
Theorell 2
Similarly, such information gathering was occurring at the same time on a smaller scale. Ralph
Van Deman was a U.S army officer who, using various means of spying and observation,
committed tens of thousands of acts of subversion against union workers in California on the
behalf of industrialists (Daskal, 9). Although the motives of both information gathering activities
were widely different, both sought to use information as leverage. The private companies used
Deman’s information to undermine attempts of union workers to unite. Of interest is the fact that
SHAMROCK was initiated during wartime for the sake of national defense but was continued
The counterargument to such fear of government overreach is that by not allowing the
government any rights to obtain data exposes the citizens of the country to the dangers of crime
and damage to the security of the country. In a need to address these dangers, it can be argued
that the need to collect information is fine so long as it is not overreaching. A government should
only need user data of its citizens that are part of, or the subject of, an investigation. The search
and or seizure of property of a citizen is protected by the fourth amendment to ensure that the
action is reasonable. The term reasonable is meant to be vague and malleable to changing
situations. Brewster quoted Nest Labs, a home automation company, on their transparency
report, “If a U.S. government agency presented us with a search warrant to investigate a crime
they think was captured on a Nest Cam, we wouldn’t just hand over user data. We’d analyze the
request to be sure the warrant wasn’t overly broad, then we’d make sure the information they
Another problem with data security stems from the fact that the world is divided by
political and geographical borders, and countries have authority within their borders. This has
always been the case, but now electronic information can flow fast and freely beyond these
Theorell 3
borders. Facebook, for example, has over a billion users on their social media platform which far
exceeds the three hundred twenty million citizens of the U.S. where the company is based. If the
government had access to all of Facebook’s user data, then it would have the information of
people who are not citizens. This might lead to violation of their rights as defined by their
respective countries. Solove in his article writes, “Canada and most European countries have
more stringent privacy statutes than the U.S., which has resisted enacting all-encompassing
legislation” (Solove 104). Any demand for user data must address these differences. One
solution might be that the government only has the right to request user data of its own citizens
Going beyond the issue of government rights is the matter of the need for respecting
privacy of the users when the data is procured. General government “fishing” should not be
allowed. As Daskal states, “the default rule should be that investigators need a warrant when
seeking the content of a U.S. person’s communications. If the government wants metadata, it
should have to document a reasonable suspicion” (Daskal, 17). Although the government has the
job of serving the people for the greater good, personal information should never be
unnecessarily be made public. For example, if in the course of warranted investigation, electronic
data obtained reveals personally embarrassing information which is not germane to the
Inherent in all of these concerns is the question does the government serve the people, or
do the people serve the government? The United States Constitution was founded on the words
“of the people, by the people, and for the people.” The title of this paper refers to Thomas
Hobbes’ Leviathan in which he argues a need for the long reach of a strong government. Because
of the dangers to individuals from crime and terrorism, such a need must be affirmed. However,
Theorell 4
history has subsequently shown that too much power in the hands of fallible individuals is
destructive of good society. Therefore, this paper argues that some limitations of that reach of
government should be extant. The government should be required to have a court issued warrant,
the subject of the user data is in the bounds of government jurisdiction, and that the use of the
Work Cited
Brewster, Thomas. “Smart Home Surveillance: Governments Tell Google's Nest To Hand Over
Data 300 Times.” Forbes, Forbes Magazine, 15 Oct. 2018,
www.forbes.com/sites/thomasbrewster/2018/10/13/smart-home-surveillance-governments-tell-
googles-nest-to-hand-over-data-300-times/#6381a3d2cfa7.
Daskal, Jennifer. “Public and Private Eyes: Surveillance in the Digital Age: We Know All about
You: The Story of Surveillance in Britain and America.” Foreign Affairs, 2017, p. 290.
Leetaru, Kalev. “Will Governments Turn Our Smart Devices Into A Massive Surveillance
Network?” Forbes, Forbes Magazine, 10 Oct. 2018,
www.forbes.com/sites/kalevleetaru/2018/10/09/will-governments-turn-our-smart-devices-into-a-
massive-surveillance-network/#5ba80a1626b6.
Solove, Daniel J. “The End of Privacy.” Scientific American, Sept. 2008, pp. 100–106.