In this Book

buy this book Buy This Book in Print
summary
To defend its citizens from harm, must the government have unfettered access to all information? Or, must personal privacy be defended at all costs from the encroachment of a surveillance state? And, doesn’t the Constitution already protect us from such intrusions? When the topic of discussion is intelligence-gathering, privacy, or Fourth Amendment protections against unreasonable search and seizure, the result is usually more heat than light.
            Anthony Gregory challenges such simplifications, offering a nuanced history and analysis of these difficult issues. He highlights the complexity of the relationship between the gathering of intelligence for national security and countervailing efforts to safeguard individual privacy. The Fourth Amendment prohibiting unreasonable searches and seizures offers no panacea, he finds, in combating assaults on privacy—whether by the NSA, the FBI, local police, or more mundane administrative agencies. Given the growth of technology, together with the ambiguities and practical problems of enforcing the Fourth Amendment, advocates for privacy protections need to work on multiple policy fronts.

“This fascinating review of the shifts and accretions of American law and culture is filled with historical surprises and twenty-first-century shocks, so beneficial in an era of gross American ahistoricality and cultural acquiescence to the technological state. Every flag-waving patriot, every dissenter, every judge and police officer, every small-town mayor and every president should read America Surveillance. We have work to do!”—Lt. Col. Karen U. Kwiatkowski, (Ret.), former Senior Operations Staff Officer, Office of the Director, National Security Agency

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Half Title, Title Page, Copyright, Dedication
  2. restricted access
    • Download PDF Download
  1. Contents
  2. pp. vii-viii
  3. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. pp. ix-x
  3. restricted access
    • Download PDF Download
  1. List of Abbreviations
  2. pp. xi-xiv
  3. restricted access
    • Download PDF Download
  1. Introduction
  2. pp. 3-13
  3. restricted access
    • Download PDF Download
  1. 1. Reconnoitering the Frontier, 1775–1899
  2. pp. 14-26
  3. restricted access
    • Download PDF Download
  1. 2. Foreign Influences, 1900–1945
  2. pp. 27-46
  3. restricted access
    • Download PDF Download
  1. 3. Espionage and Subversion, 1946–1978
  2. pp. 47-77
  3. restricted access
    • Download PDF Download
  1. 4. Calm before the Storm, 1979–2000
  2. pp. 78-91
  3. restricted access
    • Download PDF Download
  1. 5. The Total Information Idea, 2001–2015
  2. pp. 92-123
  3. restricted access
    • Download PDF Download
  1. 6. Unreasonable Searches
  2. pp. 124-132
  3. restricted access
    • Download PDF Download
  1. 7. Fourth Amendment Mirage
  2. pp. 133-147
  3. restricted access
    • Download PDF Download
  1. 8. Enforcement Problems
  2. pp. 148-165
  3. restricted access
    • Download PDF Download
  1. 9. The Privacy Question
  2. pp. 166-173
  3. restricted access
    • Download PDF Download
  1. Conclusion
  2. pp. 174-179
  3. restricted access
    • Download PDF Download
  1. Epilogue
  2. pp. 180-186
  3. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 187-232
  3. restricted access
    • Download PDF Download
  1. Selected Bibliography
  2. pp. 233-246
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 247-264
  3. restricted access
    • Download PDF Download
  1. Institute Page
  2. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.