First came news accounts of the government's use of armed drones in the targeted killing of suspected terrorists abroad. Then came the revelations about government surveillance programs, breathtaking in their scale, tapping into data on phone calls, emails, Internet searches and more.
These activities are, in fact, linked.
The use of drones to target America's enemies represents the fruition of technological evolution in weapon accuracy. While America's previous military conflicts have been characterized by military strategies that often maximized enemy casualties (think of the "body counts" during the Vietnam War), the technology of drones makes possible the highly discriminate targeting of selected individuals, with minimal civilian casualties (compared to alternative, and less sophisticated, weapon systems).
U.S. intelligence gathering, also because of advances in technology, has evolved in the opposite direction. Before data mining, and especially before the end of the Cold War, intelligence gathering was narrowly focused on selected institutions or individuals. America knew who its enemies were; the objective of espionage operations, from wiretaps to infiltration by American spies, was to find out what they were up to: whom they were communicating with, their capacities and plans.
In recent years, by contrast, the focus has shifted to intercepting and analyzing mountains of data in order to discern patterns of activity that could lead to the identification of individual enemies. Intelligence gathering has evolved from the penetration of known groups or individuals to the sifting and mining of massively "big data" -- potentially including information on all U.S. citizens, or all foreign customers of Google, Facebook, et al --in order to identify individuals or groups that are plotting attacks against Americans.
The logic of warfare and intelligence have flipped, each becoming the mirror image of the other. Warfare has shifted from the scaling of military operations to the selective targeting of individual enemies. Intelligence gathering has shifted from the selective targeting of known threats to wholesale data mining for the purpose of finding hidden threats.
The resulting paradigms, in turn, go a long way to account for our collective discomfort with the government's activities in these areas. Americans are understandably distressed over the targeted killing of suspected terrorists because the very individualized nature of the drone attacks converts acts of war into de facto executions -- and that in turn gives rise to demands for high standards of proof and adjudicative due process.
Similarly, intelligence activities that gather data widely, without fact-based suspicions about specific individuals to whom the data pertain, are seen as intrusive and subject to abuse. The needle-in-a-haystack approach to intelligence gathering is fundamentally at odds with Americans' understanding of the Constitution's promise to safeguard them against "unreasonable" government searches. There is nothing reasonable about giving government secret access, in real time, to phone calls and emails of tens of millions of Americans.
Our fear of these changes is reinforced by the absence of transparency surrounding drone strikes-specifically, the protocols for selecting targets-and intelligence operations that cast a broad net in which U.S. citizens are caught. This is why Americans remain supportive of, and thankful for, an independent and free press.
Peter Scheer, a lawyer and writer, is executive director of the First Amendment Coalition. FAC has filed suit against the Justice Department for access to classified legal memos analyzing drone strikes.