4.8 • 45 Ratings
🗓️ 20 May 2016
⏱️ 21 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Welcome to the tech policy podcast. I'm Evan Schwarger. On today's show, The Golden Age of Surveillance. Should we be talking about how to limit government collection of our data or is the more important question what they |
| 0:21.1 | do with that data after they've collected it? Joining me to discuss this is Jake Lapeirook, |
| 0:26.3 | Privacy Fellow at the Constitution Project. Jake, thank you for joining me. Hi, thanks for having me. |
| 0:30.6 | So Jake, you've got a new paper out last week titled How a Chain Link Fence can protect privacy |
| 0:35.6 | in the age of, quote, collect it all. And we will link to that |
| 0:38.8 | paper in the show notes of today's episode. It seems like your premise is that restricting data |
| 0:43.1 | collection in the first place is not enough to protect privacy in the golden age of surveillance. |
| 0:47.9 | What do you mean by that? |
| 0:49.2 | Right. Well, what we say in the papers, you know, there's a lot of really important areas |
| 0:53.7 | where we should try to limit surveillance, limit government collection, you know, ECBRA form, location privacy, or a few examples. But the fact is in a lot of ways, there are just areas that we're not going to be able to stem the tide of private data and sense of information that's going to the government. So we think it's important that we start looking at different ways that we can actually respond to what happens after the government gets |
| 1:14.9 | that information. How do they use it? How do they access it? What are the rules? What's the |
| 1:18.8 | oversight? Where are the limits? And we think that by looking at that realm, not just the collection |
| 1:24.5 | realm, but the areas where it's going to be collected, but what do we do next is a really important way that we can protect privacy and civil liberties. |
| 1:32.1 | And what would you say the problems are with the use of data after they are collected? |
| 1:38.2 | So, you know, setting aside the problems of whether the collection in the first place violates, you know, Fourth Amendment warrant protections or whether, you know, national security agencies misinterpreted the Patriot Act. |
| 1:48.3 | Those are all issues about the collection itself. What are the issues with how the data are used |
| 1:52.7 | after collection? Well, I think the problems can stem from a few different things. First, |
| 1:57.7 | you can have issues of if you collect it in a certain way, then maybe it's a |
| 2:02.2 | problem if you use it in other ways. So one big thing that we talk about a lot is these really |
| 2:07.0 | intensive military surveillance programs like Section 702 of FISA executive order 12 triple |
| 2:13.1 | 3, which is a Cold War era surveillance executive order. These are really expansive programs that were designed to basically fight the Cold War and |
| 2:22.5 | fight Al Qaeda and be a tool for military and intelligence surveillance. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from TechFreedom, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of TechFreedom and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.