Posts Tagged ‘privacy’

Spies, surveillance, and God’s power

Also known as: A theology of government surveillance (part 2). Part 1 was here.

The Bible is 2,000 years old. Technology back then was pretty simple. So I don’t read the Bible because I’m looking for exact answers on what to do. Instead, I read it to learn principles. These principles transcend the technology that is here today and obsolete tomorrow. These principles address who we are as humans, and who God is as the creator.

The creatures and the Creator

  • Achan sinned by taking the spoils of war that were to be dedicated to God. The consequences were dire: Israel lost a battle. Achan’s sin was not kept private, but “all Israel” participated in the stoning of him and his family (Joshua 7:25).
  • God sent spies to the promised land. They were asked to report on the reality of the land that they were attacking, and Moses told them to “be of good courage” (Numbers 13:20). When the spies came back and gave their report, their courage was lacking. They said “We are not able to go up against the people, for they are stronger than we are” (Numbers 13:31). These spies disobeyed because they forgot the reality that God is great. However, the spies’s words led the whole congregation astray, and the people complained bitterly. They failed to trust in God to be stronger than the nations they were opposing. The consequence for the false report was 40 years of wandering in the desert!
  • Through the coming of the wise men, Herod learned that the king of the Jews was born. He was afraid of this new information, so he asked the wise men to tell him where Jesus was. When they did not, Herod ordered that all male children under two years be killed in Bethlehem.  But Joseph was warned, and Jesus was not in Bethlehem when the killing happened. It seems that God was in control over the situation. Herod knew something (the king of the Jews is under two years old and in Bethlehem), yet he didn’t know something (where he is located). Joseph knew something (that he should flee to Egypt), but he didn’t know something (the exact nature of the threat). Yet God was in control, and prophecy was fulfilled by the tragic actions that happened. (See Matthew chapter 2)
  • While David is on the roof of the king’s house, he sees a woman bathing. While this woman might have wished that her naked body remain private, David now sees that she is beautiful. David has not sinned up to this point, but what he does next is entirely his responsibility. He inquires about the woman and learns her name is Bathsheba (2 Samuel 11:3). Spies may or may not gather certain information that we wish to be held private, but it is their responsibility what they do with that information.

Reading these stories (can you think of others?) helped me remember that God is in control and I am not. I am reminded of God’s attributes (as I wrote about earlier) and of my position before him as a child of God, clothed in righteousness because of the death and resurrection of Jesus Christ. Now I am ready to respond to the situation in front of me!

Our response

When faced with recent revelation that the United States government is overstepping its constitutional bounds in searching and seizing our data, how should we respond? I don’t think we should panic or become paranoid. After all, we should not fear those who kill the body, or spy on it, and after that have nothing more that they can do. But fear him who sees all and has authority to cast into hell! (Luke 12:4-5)

So if you’re reading this and you don’t know Jesus and trust in him for the forgiveness of your sins and to change your eternal destiny, please trust him now! His work has been done, and that is good news. (Others have written and spoken about this–here’s a good starting place.)

If you do know Jesus, then God has an interesting kind of surveillance over your heart: “O Lord you have searched me and known me” (Psalm 139). Indeed, the very hairs on your head are numbered (Luke 12:7). (Even the NSA and the CIA don’t know that.)

Getting practical

I love the reminders from the Bible. They help me worship God. Still, my original issue is unanswered, how do I maintain the security of my data in the face of government surveillance?

Much of this surveillance is in response to the terror attacks of 2001. I ask myself, what is my response when tragic events happen in the world? In Luke 13:1-5, Jesus uses some contemporary tragic events to make the point that we should repent. Terror attacks remind us that life is short, and we need to be ready to die. I think that many Americans have failed to see this reminder, and our government has decided that what is best for us is to be “safer.” So we change some security rules, hoping that someone will notice that we tried to make our country “safer.”

An ideal government would do what is best for the people. But I know that I live in a fallen world. Sin affects the relationship between people and their God, and it affects the relationships among people. Therefore, I am not surprised when my government is imperfect. I can pray for my government leaders and (praise God) I live in a country where I can write my representative leaders and vote in elections.

Still, in the short-term I would like to keep my data private. Some people will say, if I haven’t done anything wrong, why should I worry? I can’t address the answer to this question here, because it would take too long, but Daniel J. Solove has written an excellent answer in his article Why Privacy Matters Even if You Have ‘Nothing to Hide’.

After reading that article, do some research and learn how much information about you is being collected: by the government, by the cloud services we voluntarily use, and by the advertising agencies that track us on the web. Then do something about it. Maybe delete a few cloud services, and install a cookie blocker on your web browser. Some changes will be minor, some may be a little inconvenient, and some are more drastic. It is up to you.

A theology of government surveillance (part 1)

As I navigate the modern world, I am presented with a bewildering array of technology options. Not only that, but I find that governments are increasingly interested in recording what I do. Hopefully, for now they will find nothing worth acting on in what they have found. Still, I find it all too easy to fall into fear in the face of the unknown. Who is reading this blog post? What will a government agency do with the information they find in my cell phone text messages?

In the face of this fear, I need to remind myself that God is sovereign. He is seeking his glory by giving grace toward undeserving humans through the death and resurrection of Jesus Christ. As I am a follower of Jesus, I am interested in trusting in him and finding out what the Bible has to say about security.

A Christian view of technology

Other writers have addressed a Christian view of technology. This past year I read (or rather listened to) Tim Challies’ book, The Next Story: Life and Faith after the Digital Explosion. The quantity of information available to us through digital means presents new challenges for those who wish to obey God. Some problems include a redefinition of truth and authority, the distraction brought on by technology, and communication becoming an idol in our lives. The information that technology allows us to so easily store and transmit is not neutral! Rather it has implications for how we live our lives.

God’s attributes

The attributes of God that seem most relevant to our discussion are the “omni” attributes, which come from a prefix meaning all.

  • God is omnipotent. That is, he is able to do all his holy will. This is also called God’s sovereignty.
  • God is omniscient. God fully knows himself and all actual and possible things.
  • God is omnipresent. God has no size or shape and is present in all places with his entire being.
  • God is eternal. God has always existed, having no beginning and no end, and experiencing no succession of moments.

Source: Tim Challies, Visual Theology – The Attributes of God

What is security and privacy?

My brief definition of security is that I want access to my data, and I don’t want others to. My data, or my information, includes files on my computer, digital information about my phone calls, information about my web browsing habits, books that I am interested in, and pictures of me at the beach. I want access to my data with little hassle, that is I don’t want to bother with too many USB drives or too many passwords and complex security measures. But when it comes to others accessing my data, I really only want those I trust to have access to specific things.

The government might want access to some information about me in order to keep me safer. For example, the police might know that my phone number is tied to my address in order to respond to a 911 call. My bank legally needs to know some contact information, because, after all, it is my money they are holding. I willingly provide this information to them when I open an account.

Privacy, secrecy, and confidentiality are related words that also apply to this situation. I’m using these terms loosely as synonyms for security as I’ve defined it above.

What is the role of government?

Let every person be subject to the governing authorities. For there is no authority except from God, and those that exist have been instituted by God.  Therefore whoever resists the authorities resists what God has appointed, and those who resist will incur judgment.  For rulers are not a terror to good conduct, but to bad. Would you have no fear of the one who is in authority? Then do what is good, and you will receive his approval,  for he is God’s servant for your good. But if you do wrong, be afraid, for he does not bear the sword in vain. For he is the servant of God, an avenger who carries out God’s wrath on the wrongdoer.  Therefore one must be in subjection, not only to avoid God’s wrath but also for the sake of conscience.
(Romans 13:1-5 ESV)

After laying out “the depth of the riches and wisdom and knowledge of God” (11:33) in his plan for salvation, Paul turns to moral exhortations. The Christians in Rome are to “be subject to the governing authorities” (verse 1). For them, that meant being subject to a government that was sometimes hostile toward them.

But in a broader sense, this passage from Romans describes a basic duty of government. Government should rule its subjects with justice. In the words of verse 3, government should punish those who do bad and not those who do good. In the Old Testament, God set up a special system of government over his people, the Israelites. He gave them laws and a system for enforcing those laws.

There several ways to connect this with a modern nation like the United States. First, we have a law, that murder is illegal. The system for enforcing that law in my city is the police department. If a dead body is found somewhere, there’s probably going to be a murder investigation. If the police can find out who did it, then this individual will be brought to justice. Law enforcement should be adept at fingerprints, footprints, and all kinds of crime scene evidence in order to catch criminals.

Digital technology creates more possibilities for crime and more ways for law enforcement to catch criminals. For example, the murderer could have revealed his plans in an online chat room a few days before the dead body was found. There are also online crimes, such as phishing and stealing people’s credit card information. Law enforcement should be adept at technology in order to catch these criminals as well.

A sidenote: Isn’t it interesting that we enforce a law against murder mainly by punishing people after they have already committed murder. This is because we can’t predict the future, and we are limited in our ability to prevent people from doing bad things. In Minority Report, the police had the ability to predict when and where and who would commit a murder, but this led to some interesting side effects. God, of course, is omniscient, and because he is eternal, he knows the future.

More to come…

In part 2 I’ll write some thoughts on passages of the Bible about spies, surveillance, and God’s power.

The Social Factor

My boss’s boss at my summer internship loaned me “The Social Factor: Innovate, Ignite, and Win through Mass Collaboration and Social Networking,” by Maria Azua. (IBM Press, 2010)

The book focuses on some societal changes that are happening. The thesis of the book is that companies need to respond to these changes in order to succeed.

Ready for a history lesson? Chapter 1, “The Dawn of the Social Age,” covers some important background in communication technology. Each new communication technology (Radio, TV, Computer, Internet) had a faster adoption rate than the technology before it, and the result is a shift in how people communicate and share information. Chapter 2 discusses the implications for companies: employees are better able to share information if they can use these new technologies.

The next chapters discuss a number of social tools: blogs, wikis, tagging, Twitter, Facebook, and LinkedIn. As I read, I compared the tools the author discussed with tools that I have used. I am somewhat familiar with blogging, as I blog here and at midmncru.com. I have contributed to Wikipedia. My summer internship is at Securian, and our company uses SocialText for several internal Wikis. I have a Facebook account, but I haven’t tried Twitter or LinkedIn yet. Reading this book definitely swayed me toward trying out these services.

On the other hand, after taking my Computing Ethics class at SCSU, I am increasingly cautious about sharing information online. A recent article I found through ACM confirmed this. The Obama administration released a roadmap that discussed cyber security, saying “The public is insufficiently aware of the risk of sharing information in cyberspace — which can affect personal and national security.” Whenever you’re using the internet, your every action is tracked and cataloged somewhere, and you don’t always have control over it.