{"id":4001,"date":"2014-02-10T23:46:01","date_gmt":"2014-02-11T04:46:01","guid":{"rendered":"http:\/\/www.opensource.im\/?p=4001"},"modified":"2014-02-10T23:46:01","modified_gmt":"2014-02-11T04:46:01","slug":"nsa-spying-undermines-separation-of-powers-column","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/nsa-spying-undermines-separation-of-powers-column.php","title":{"rendered":"NSA spying undermines separation of powers: Column"},"content":{"rendered":"<p><p>  Glenn Harlan  Reynolds 2:28 p.m. EST  February 10, 2014<\/p>\n<p>        The White House.(Photo: Susan Walsh, AP)      <\/p>\n<p>    Most of the worry about the National Security Agency's bulk    interception of telephone calls, e-mail and the like has    centered around threats to privacy. And, in fact, the evidence    suggests that if you've got a particularly steamy phone- or    Skype-sex session going on, it just might wind up being        shared by voyeuristic NSA analysts.  <\/p>\n<p>    But most Americans figure, probably rightly, that the NSA isn't    likely to be interested in their stuff. (Anyone who hacks    my e-mail is automatically punished, by having to read    it.) There is, however, a class of people who can't take that    disinterest for granted: members of Congress and the judiciary.    What they have to say is likely to be pretty interesting to    anyone with a political ax to grind. And the ability of the    executive branch to snoop on the phone calls of people in the    other branches isn't just a threat to privacy, but a threat to    the separation of powers and the Constitution.  <\/p>\n<p>    As the Framers conceived it, our system of government is    divided into three branches -- the executive, legislative and    judicial -- each of which is designed to serve as a check on    the others. If the president gets out of control, Congress can    defund his efforts, or impeach him, and the judiciary can    declare his acts unconstitutional. If Congress passes    unconstitutional laws, the president can veto them, or refuse    to enforce them, and the judiciary, again, can declare them    invalid. If the judiciary gets carried away, the president can    appoint new judges, and Congress can change the laws, or even    impeach.  <\/p>\n<p>    But if the federal government has broad domestic-spying powers,    and if those are controlled by the executive branch without    significant oversight, then the president has the power to    snoop on political enemies, getting an advantage in countering    their plans, and gathering material that can be used to        blackmail or destroy them. With such power in the    executive, the traditional role of the other branches as checks    would be seriously undermined, and our system of government    would veer toward what James Madison in The Federalist No. 47    called \"the very    definition of tyranny,\" that is,    \"the accumulation of all powers, legislative, executive, and    judiciary, in the same hands.\"  <\/p>\n<p>    That such widespread spying power exists, of course, doesn't    prove that it has actually been abused. But the temptation to    make use of such a power for self-serving political ends is    likely to be very great. And, given the secrecy surrounding    such programs, outsiders might never know. In fact, given the    compartmentalization that goes on in the intelligence world,    almost everyone at the NSA might be acting properly, completely    unaware that one small section is devoted to gather political    intelligence.     We can hope, of course, that such abuses would leak out,    but they might not.  <\/p>\n<p>    Rather than counting on leakers to protect us, we need strong    structural controls that don't depend on people being    heroically honest or unusually immune to political temptation,    two characteristics not in oversupply among our political    class. That means that the government shouldn't be able to spy    on Americans without a warrant  a warrant that comes from a    different branch of government, and requires probable cause.    The government should also have to keep a clear record of who    was spied on, and why, and of exactly who had access to the    information once it was gathered. We need the kind of extensive    audit trails for access to information that, as the Edward    Snowden experience clearly illustrates, don't currently exist.  <\/p>\n<p>    In addition, we need civil damages  with, perhaps, a waiver of    governmental immunities  for abuse of power here. Perhaps we    should have bounties for whistleblowers, too, to help encourage    wrongdoing to be aired.  <\/p>\n<p>    Is this strong medicine? Yes. But widespread spying on    Americans is a threat to constitutional government. That is a    serious disease, one that demands the strongest of medicines.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.usatoday.com\/story\/opinion\/2014\/02\/10\/nsa-spying-surveillance-congress-column\/5340281\/\" title=\"NSA spying undermines separation of powers: Column\">NSA spying undermines separation of powers: Column<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Glenn Harlan Reynolds 2:28 p.m. EST February 10, 2014 The White House.(Photo: Susan Walsh, AP) Most of the worry about the National Security Agency's bulk interception of telephone calls, e-mail and the like has centered around threats to privacy<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-4001","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/4001"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=4001"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/4001\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=4001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=4001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=4001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}