Freedom and security: striking a balance

 

Creators.com

“Gentlemen do not read each other’s mail,” said Secretary of State Henry Stimson of his 1929 decision to shut down “The Black Chamber” that decoded the secret messages of foreign powers.

“This means war!” said FDR, after reading the intercepted instructions from Tokyo to its diplomats the night of Dec. 6, 1941.

Roosevelt’s secretary of war? Henry Stimson.

Times change, and they change us.

The CIA was created in 1947; the National Security Agency in 1952, with its headquarters at Ft. Meade in Maryland. This writer’s late brother was stationed at Meade doing “photo interpretation” in the years the CIA’s Gary Powers, flying U-2s at 70,000 feet above Mother Russia, was providing the agency with some interesting photographs.

This last week, through security leaks, we learned that the NSA has access to the phone records of Verizon, Sprint and AT&T. Of every call made to, from or in the U.S., NSA can determine what phone the call came from, which phone it went to, and how long the conversation lasted.

While NSA cannot recapture the contents of calls, it can use this information to select phones to tap for future recording and listening.

Through its PRISM program, the NSA can acquire access, via servers such as Apple, Google, Yahoo, Facebook, Microsoft and AOL, to all emails sent, received and presumably deleted or spammed. And if the NSA can persuade a secret court that it has to know the contents of past, present or future emails, it can be accorded that right.

Our ability to intercept and read communications of foreigners and foreign governments seems almost limitless. In the Nixon years, Jack Anderson reported that we were intercepting the conversations of Kremlin leaders in their limos, and listening in on Mao Zedong and Leonid Brezhnev. Our capacity today is surely orders of magnitude greater.

Last week, we also learned that Barack Obama, by Presidential Policy Directive 20, has tasked our government to prepare for both defensive and offensive cyberwarfare to enable us to attack whatever depends on the Internet anywhere in the world.

Lately, the U.S. and Israel planted a Stuxnet worm that crippled scores of centrifuges and disabled Iran’s nuclear enrichment plant at Natanz. If we can do this in Iran, can we not do the same to nuclear plants all over the world, creating two, three, a hundred Chernobyls and Fukushimas?

Is it too much to imagine that, one day, if not already, the United States will be able to cyber-sabotage the power plants, electrical grids and communications systems of any country on earth?

With its ability to locate and listen in to terrorists, to track by satellite and kill by drone, America has acquired an extraordinary ability to protect its people and prevent and punish terrorist attacks.

But was any of this really surprising? Were we all in the dark as to what the CIA, the NSA and the Pentagon could do?

And as we think back on 9/11, of our doomed countrymen jumping to their deaths from the World Trade Center, the dead and maimed at the Boston Marathon, will not most Americans say, “Thank the Lord we have this power, and God bless the men and women who are using it to defend us”?

While this power is extraordinary, it is still not of the same magnitude as the 50,000 nuclear weapons we had 50 years ago, at the time of the Cuban missile crisis, when war could have led to scores of millions of American dead.

Nevertheless, for a people whose proud boast is that our nation was conceived in freedom, this brave new world is sobering. Our own government has the power to intercept and listen to every phone call we make, to read every email we send or receive, to track us with cameras we cannot see, and to wage secret cyberwar against enemies real or perceived without a declaration of war.

Yet, we can no more uninvent the technology that enables our government to do this than we can uninvent the atom bomb. And rival powers like China are surely seeking the same capabilities.

Thomas Jefferson instructed us that “in questions of power, let no more be heard of confidence in men, but bind him down from mischief by the chains of the Constitution.”

But, ultimately, what other option do we have than to place our confidence in those whom we have entrusted with this power?

Congress is not going to pass a law telling the NSA that it may not coordinate with AOL, Apple or Google to access information that might prevent a terrorist attack. And if a terrorist attack hits this country, and our security agencies say their hands were tied in trying to protect us, all bets would be off as to what intrusions upon their freedom Americans might accept.

In the end, we ourselves are going to have to strike the balance between freedom and security.

But the question lingers.

If Big Brother is our guardian angel now, could he become Lucifer?

Patrick J. Buchanan is the author of “Suicide of a Superpower: Will America Survive to 2025?”

© 2013, CREATORS.COM

Read more From Our Inbox stories from the Miami Herald

  • It’s not Beijing’s hackers you should worry about, it’s Moscow’s

    When U.S. officials warn of the threat foreign cyber spies pose to American companies and government agencies, they usually focus on China, which has long been home to the world’s most relentless and aggressive hackers. But new information shows that Russian and Eastern European hackers, who have historically focused their energies on crime and fraud, now account for a large and growing percentage of all cyber espionage, most of which is directed at the United States.

  • Elizabeth Warren’s needed call for student loan reform

    As commencement season approaches, graduating students will soon hear words of wisdom from speakers offering experience, advice and inspiration. One thing they’re not likely to hear about is the $1.08 trillion elephant on the quad — our nation’s student debt crisis.

  • Jenny McCarthy, vaccine agitator, does a pivot

    What do you call someone who sows misinformation, stokes fear, abets behavior that endangers people’s health, extracts enormous visibility from doing so and then says the equivalent of “Who? Me?”

Miami Herald

Join the
Discussion

The Miami Herald is pleased to provide this opportunity to share information, experiences and observations about what's in the news. Some of the comments may be reprinted elsewhere on the site or in the newspaper. We encourage lively, open debate on the issues of the day, and ask that you refrain from profanity, hate speech, personal comments and remarks that are off point. Thank you for taking the time to offer your thoughts.

The Miami Herald uses Facebook's commenting system. You need to log in with a Facebook account in order to comment. If you have questions about commenting with your Facebook account, click here.

Have a news tip? You can send it anonymously. Click here to send us your tip - or - consider joining the Public Insight Network and become a source for The Miami Herald and el Nuevo Herald.

Hide Comments

This affects comments on all stories.

Cancel OK

  • Marketplace

Today's Circulars

  • Quick Job Search

Enter Keyword(s) Enter City Select a State Select a Category