Uploaded by Kwame Sefa-Boateng

Ethical Assesment of State Surveillance and Privacy

advertisement
1. INTRODUCTION
Since the terrorist attacks of September 11, 2001, concerns about national security have risen
significantly, at the expense of privacy rights. Remarkably, one-third of people surveyed agreed
that “this use of investigative powers by the president should be done under his executive authority
without needing Congressional authorization”. In post-9/11 America, President Nixon’s abuses of
presidential power seem like ancient history (Quinn, 2013).
Innovations in technology have facilitated increased possibilities for communication and freedom
of expression, enabling anonymity, rapid information sharing, and cross cultural dialogues. At the
same time, changes in technologies have also provided new opportunities for State surveillance
and intervention into individuals’ private lives (Rue, 2013). These technologies which in the first
place are created within existing state laws and policies, have enabled governments to enact laws
that seek to monitor private communications. Communication surveillances have been on a
massive scale to the extent that it has moved from monitoring ordinary individuals to very
prominent people as in the case of National Security Agency (NSA) spying on German Chancellor
Angela Merkel which was revealed in February, 2015. The National Security Agency (NSA)
widespread wiretapping as released by Edward Snowden dubbed Wiki Leaks caused mixed
reactions from all over the globe. The controversial argument raised debates over government
communication surveillance, secrecy and the balance between the constitutional right to privacy
and governments responsibility to provide national security. The right to privacy is a fundamental
human right enshrined in many constitutions in several countries practicing democratic form of
government. But should one assume that once they are hooked onto any of these communication
networks like internet and telephony, they do have complete privacy especially in the era of social
media and advancement in communication gadgets? The real threat of global terrorism, drugs
trade, money laundering amongst other social crimes are being facilitated by sophisticated
communication through the internet or mobile phone.
Governments all over the world are enacting laws to mitigate or curtail the threats that accompany
sophistication in telecommunication now. The United States has the Providing Appropriate Tool
Required to Intercept and Obstruct Terrorism (PATRIOT), ACT 2001, Electronic
Communications Privacy Act 1986 (ECPA) and ESCHELON, which is pact signed by five nations
including the UK, Canada, Australia and New Zealand as examples of law that seems to provide
basis for communication surveillance. Several other countries like the United Kingdom, French
have also enacted similar laws to intercept communications on their citizens. The laws have
become necessary because of occurrence of terrorism which has become prevalent in the world.
Most of these acts of terrorism have been orchestrated by persons within the country with
collaboration with other people from other countries.
Not withstanding the strong argument for the state to have the powers to monitor its citizens so as
to protect them, it must be worth noting that from the Paternalism theory and social contract theory,
where it strongly supports and give credence to the state in making those decisions, this will be
partly depending on the kind of state. In a typical dictatorship state or a weak democracy where
the vote buying, intimidation is prevalent, this will mean that the wrong kind of people who may
be ethically egoistic may be making decision by looking into themselves only but not the general
population.
The government of Ghana seeks to pass a law that allow government agencies to wiretap and
intercept packages meant for its citizens on suspicion of wrong doing through the Interception of
Postal Packages and Telecommunication Bill (ITTPA) it has submitted to Parliament. This has
become become necessary due to these major reasons. First of all, with the discovery of oil in
Ghana, our neighbors’ especially, the Ivory Coast, has been challenging Ghana on boundaries
issues. In this regard, the navy has been put on high alert to monitor communication in and around
the sites to curb any unrest that may occur as a result of the discovery with our neighbor. Such
surveillance is done by intercepting radio communication and jamming of cell sites. Secondly, the
National Security Agency recently gave notice of terrorism threat in Ghana. Such information was
made credible through communication interception for which the person’s involved testified that
Ghana was next to be attacked after Burkina Faso and Ivory Coast. Again, certain crimes like
armed robbery, murder, drug have been on the rise and these vices increases the security threat
posed to the state. In the light of all these instances, it has become necessary for the state to find a
legal framework that will deal with how communication surveillance and its interception will be
conducted. The main objective of the bill is to permit the law interception of postal packet and
telecommunication messages for the purpose of fighting crime, suppressing organized crime
including money laundering, terrorism and narcotics trafficking, and to identify theft and the
protection of national security.
The bill has raised several objections from civil society and certain notable institutions as it
infringes on individual privacy and that not enough consultation has been done. Among the notable
institutions which have objections to this bill are the Privacy International, Imani Ghana, Occupy
Ghana and individuals such as Mr. Martin Amidu, former Attorney General of the Republic of
Ghana. Several reasons have been cited for the abolition of such a bill even for consideration by
parliament. Among them are the infringement on the civil liberties enshrined in the constitution,
tendency for abuse by the state as the national security advisor is appointee of the government.
Again, the citizens have not been engaged in the discussion. Privacy international intimated that,
most sessions or clauses in the bill are vague and that it could lead to the seamless abuse by the
state security agencies. Considering the increasing ubiquitous of telecommunication tools and
networks and the threat to society posed by the application of these networks, it has become
necessary to draw a line between how the use affects the security even to the individual or the
nation and how not to infringe on the privacy rights of the user. The ethical dilemma lies not in
just the legality of wiretapping, but in the question of our private and public freedoms being run
over by a zealous government, all in the name of national security (Mullikin & Rahman, 2010).
Do government and security agencies have a moral ground to listen in to one’s communication
based on suspicion? Is the violation of one’s privacy not relevant if the end result leads to the good
of society? Does Ghana have requisite tools and legal framework to deal with surveillance? All
these are questions that needs to be addressed so as to create a neutral ground for the balance
between communication surveillance and the right to privacy.
In this paper, the nature of communication surveillance and the laws under which they are
appropriated would be reviewed. The national security implication and whether it is ethical for the
governments, especially that of Ghana, to push through the passing and implementation of this law
would be analyzed.
The Utilitarian ethical theory, State Paternalism theory and the Kantianism will be used as a basis
to defend the position that, although our privacy will be curtailed someway, the greater good is
done if the law is formulated to protect individual’s privacy right and still keeps us secure by
eliminating threats that may prevail in the country.
2
LITERATURE REVIEW
2.1 COMMUNICATION SURVEILLANCE
“A popular Government, without popular information, or the means of acquiring it, is a Prologue
to a Farce or a Tragedy; or perhaps both”, James Madison.
Communication surveillance is the monitoring, interception, collection, preservation and retention
of information that has been communicated, relayed or generated over communications networks
to a group of recipients by a third party (Privacy International, n.d.)
Mostly, unless, done with criminal intentions like installing malware or tapping of communication
networks illegally, surveillance is normally backed by a court order which is normally based on
law of the state. Under very urgent circumstances, state agencies like law enforcement agency,
intelligence agency or a private company are allowed to conduct surveillance such as under the
PATRIOT ACT without a court order.
Communication surveillance is done based on a number of factors but the most dominant reason
for government surveillance is security. The threat of global terrorism, drug trafficking, human
trafficking and robberies have made it necessary for the state to implement these laws in order to
curtail the damage these activities cause the society. For example, most developed countries like
the US and UK do have surveillance cameras installed on roads and highway to check over
speeding and unsafe driving. Offenders are given fine and in some instance their driving licenses
withdrawn. This form of surveillance provides a means of making driving safe which leads to less
accidents and casualties.
In as much as development in communication networks have increased tremendously over the past
three decades giving users control over which device or medium to use, it has also exposed the
user to be less private than before since the they don’t control the medium by which they
communicate and even the software that are running on their communication devices. Their
engagement with social media, ecommerce, associations also exposes them to be targets for
surveillance.
Several forms of communication surveillance exist but common among these are internet
monitoring, mobile phone interception, fixed line interception and intrusion technologies. Soloves
taxonomy of privacy provides four (4) main definition or processes by which surveillance is
conducted. This involves the collection of information through social media, e-commerce, census
or other approved medium. The United States uses the national census conducted every ten (10)
year, Internal Revenue, National Crime Information Centre, Department of Justice and ClosedCircuit Television camera’s to collect data on its citizens (Quinn, 2013). Processing of collected
information using analytical tools can lead to other realities that may not have been the reason for
collecting the data in the first place. Dissemination of processed information and finally leading to
invasion based on the information gathered. Government or states embarking on communication
surveillance collect information from phone conversations, internet sites visited, email habits,
credit card and bank records and almost everything that is communicated electronically. The nature
of communications surveillance is such that, it is always done at the blind side of the person or
groups being monitored. Unless such persons have systems that can detect they are being
monitored, information collected overtime becomes conclusive for making decision or taking an
action to either avert or curtail an action against the state. This could be done to test the degree of
security being provided to those transmissions (Penetration tests). In particular, the purposes
include providing a basis for advising commanders on the security risks resulting from their
transmissions, improving the security of communications, and planning and conducting
manipulative communications deception operations.
It is also sometimes nationally conducted in allied exercises to aid in analysis of communication
security to be able to protect all stakeholders of the communication system against crimes
including money laundering, terrorism, narcotic trafficking and identity theft.
2.2 THE RIGHT TO PRIVACY
According to the Stanford Encyclopedia of Philosophy, the concept of privacy has roots in
philosophical discussions including Aristotle’s distinction between the public sphere of political
activity and the private sphere of domestic family life (Trina, 2013)
Privacy is a fundamental human right recognized in the UN Declaration of Human Right, the
International Covenant on Civil and Political Rights and in many other international and regional
treaties. Although, it s a fundamental right, it is or may be not absolute human right and most
significantly, losing its meaning in this technological era. Almost all democracies have laws
enshrined in their constitutions or through the courts, the right to privacy, in its lowest form, the
right to non-violation of one’s home and the secrecy of communications. Such laws are also based
on international conventions such as the UN Declaration on Human Right, the European
Convention on Human Right and other internationally recognized laws on human right. The 1948
Universal Declaration of Human Rights, in article 12, states that, “No –one should be subjected to
arbitrary interference with his privacy, family, home or correspondence, nor to attacks on his honor
or reputation” (Universal Declaration of Human Rights, 1994)
The right to privacy is the ability of an individual to determine who holds information about them
and how that information is used (Rue, 2013). In other words, a person’s right is a social contract
that allows an individual to have some control over his able to gain access to his physical self and
personal information. (Warren & Brandeis, 1890), intimated that, privacy is the right to be left
alone. In this regard, one can place the right to privacy within a moral or legal context. Without
legality, a person has a fundamental right that can be explained in terms of other fundamental
rights like life, liberty and Property (Alfino & Mark, 2003).
Protection of privacy has become more important in this technological dispensation. Adoption of
laws to protect privacy can be attributed mostly to the following reasons. First, to provide remedy
for past injustices as in the case of dictatorial leadership where privacy is violated at will. Secondly,
the advancement of electronic communication within and across states requires protection for
individuals personal and financial information. Again to ensure conformity to international laws
and to protect communication across border, most countries especially in Europe and Canada are
enacting laws that seeks to be coherently adopt international laws on privacy albeit a requirement
so as to be able to transact business amongst them.
Privacy has both benefits and harms for the individual and by extension to society. (Trina, 2013)
professed fourteen (14) reasons privacy matters by reviewing scholarly articles from different
disciplines. She places the benefits into three (3) categories. These were the benefits to the
individual, benefits to personal relationships and the benefits to society. Some benefits to the
individual include, the protection of the individual from overreaching social interactions and
opportunity for relaxation and concentration (Warren & Brandeis, 1890), affirmation of selfownership and ability to be a moral agent (Reiman, 1976), prevents intrinsic loss to freedom of
choice (Reiman, 1976), allows for freedom from self-censorship and anticipatory conformity and
allows people to explore their “rough draft” ideas.
2.3 STATE PATERNALISM
Limiting the freedom to fully control one’s space as against the state’s mandate to provide
maximum security without infringing on it’s right to privacy has been an unending debate. The
debate resides within and not limited to the ethical justification, the legality, possible abuse by the
state and security. As stated earlier, privacy is fast losing its significance with the prevailing
advancement in communication networks such as the internet, mobile devices have become
prevalent. The ethical justification of privacy should be looked in the context of a workable ethical
theory that should persuade us to accept that if we were allowed to maintain total privacy, the
whole society would be better than the state curtailing that privacy by interfering in our
communications just to ensure that they are up to date in providing security for all.
Trelaine Ito, provides an ethical justification of state paternalism considering the restriction of
individuals’ freedom and rights to maximize group utility. He argues that, the state derives its
authority from act-utilitarianism, a theory that values utility (happiness) as a measurement for
consequences and subsequent course of justifiable manner (Mautner, 2010). Using the theory of
Paternalism, which recognizes the need to prevent self-inflicted harm as a legitimizing reason for
coercive legislation, he makes the points that, persons competent and sometimes non-competent
or irrational people need to be protected from causing harm to themselves or others. In order words,
limiting individual freedom in a way that increases the utility of the many is the core component
of state paternalism. In championing for strong state paternism, Gerald Dworkin asserts that,
“Extensions of paternalism are argued for by claiming that in various, chronologically mature
individuals share the same deficiencies in knowledge, capacity to think rationally, and the ability
to carry out decisions that children posses” (Schauer & Sinnot-Armstrong, 1996). As an example,
people have the right to smoke but since secondary smoking has been found to be causing cancer
on a large scale, the state must legislate laws that seeks to protect that persons right to smoke
whiles making sure his actions doesn’t affect others. It is the reason for most countries prohibiting
smoking in public places.
The second argument he makes is that, freedom or liberty does not have in it self an intrinsic value
but rather the the value is in the consequence of freedom or privacy. The intrinsic value of
something is said to be the value that thing has “in itself,” or “for its own sake,” or “as such,” or
“in its own right.” Using the same example, a person smoking in public would be doing so within
his own right or freedom, but the value of what he does, is in the consequence of how other people
who may not be smokers inhaling it and possibly suffering from cancer.
The final point made by the author is that, the state has more resources comparatively to collect
data, analyze and make decisions that affect everyone more than an individual. When the state has
to make a decision, it looks at the interest of everyone involved and come to a conclusion based
how best, it will help all and not just some.
It would seem, however, that most of the literature that debates the individuals right to privacy and
the government’s right to secure its citizens falls into the broader category of social contract theory.
The idea of the state should be placed in the context that, the people making the decisions who are
the government are chosen by the individual within the state. Their ideologies are ideas shared by
the majority of the people in the state. And hence, according to Hobbes, Locke and Rousseau, the
power of the state is derived from the consent of its citizens. The idea of consent implies a
normative power to bind oneself (D'Agostino & Gaus, 2008). In this regards, anything that is right
or wrong with the state is the decision or the will of the state.
3.
THEORITICAL FOUNDATION
From the eighteenth century to date, six authors have significantly contributed to the utilitarianism
ethical theory.
First was David Hume, who argued that our moral thoughts are driven by what we find agreeable.
He argues that the utilitarianism focus on well-being has a strong basis in human nature.
Second author was Jeremy Bentham. His book “An Introduction to the Principles of Morals and
Legislation”, he demonstrated the application of utilitarianism to issues such as Penal and Criminal
Law. John Stuart Mill, the third author, gave his own version of the theory in 1861 through an
essay “Utilitarianism”. This essay is currently the most widely read utilitarianism version. John
built his version on the rigorous thoughts of Jeremy Bentham. But he also added other thoughtful
versions of moral motivation and the role of moral rules in utilitarian reasoning about moral
problems. Fourth is Henry Sidgwick, who published “The Methods of Ethics”. This publication is
viewed as the most ethical, organized and detailed refined paper on utilitarianism. The fifth author,
R. M. Hare published several articles in the second half of the twentieth century. In these articles,
Hare argued that a practice of utilitarianism is necessitated by the most probable meta ethical
theory of the meaning of ethical terms such as ‘ought’. He also defended it as the practical way of
resolving a range of ethical complications. Finally, the late Peter Singer made use of books,
articles, newspapers and television broadcasts to publicly argue for utilitarian approaches to
matters such as the treatment of animals, poverty relief and other issues in medical ethics.
Governments surveillance which involves collection, processing, dissemination of information
and its consequence on the privacy of its citizen must be situated in a workable ethical theory.
Several theories tend to support the notion of balancing privacy with security taking into the
consideration the benefits for everyone. Coming from the foundation that, privacy is prudential
and not a natural right, and again, knowing the harms and benefit of privacy, we discuss that for
ethical reason, there must be a compelling support for people to give up certain rights to enjoy
security or vice-versa. In this regard, we discuss the utilitarian theory of ethics, it’s history and the
characteristics.
Utilitarianism is an ethical theory that is more interested in consequences than intent. An act is
considered right if it’s good outcomes is more than the bad outcomes (Eggleston, 2012). People
are expected to act in a way that will result in the greatest possible amount of well-being.
Utilitarianism became a well-defined ethical theory during the eighteenth century.
It can be described as a theory of ethics because it tells good or bad and also right or wrong. But
some of the key concepts of it talks about the conduct of public life. This makes the theory political.
The theory is an assessment of the total utility, that is, happiness from an action, motive, policy or
institution. The justification of an action is determined by the value of the consequences of that
particular act. Utilitarians believe that the main reasons behind morality is to better life through a
boost in the amount of good things (such as pleasure and happiness) and a reduction in negative
things (such as pain and unhappiness).
Utilitarianism does not agree to systems that use moral guides based on customs, traditions, or
orders given by leaders or supernatural beings. Instead, they think that what makes a morality
justifiable is its positive contribution to human (and perhaps non-human) beings.
Utilitarianism is based on the fact that pleasure and happiness are valuable while pain and suffering
are naturally not valuable. Also anything else has value only in its happy or positive outcomes (i.e.
"instrumental", or as means to an end). This focus on happiness or pleasure as the ultimate end of
moral decisions, makes it a type of Hedonism (sometimes known as Hedonistic Utilitarianism).
Utilitarians support equality through equal consideration of interests, and they reject any arbitrary
isolations such as to who is worthy of concern and who is not, and any form of discrimination
between individuals. However, utilitarianism agree to the idea of declining marginal utility, which
recognizes that the same thing furthers the interests of a well-off individual to a lesser degree than
it would the interests of a less well-off individual.
3.1 KINDS OF UTILITARIANISM
There are three main types of utilitarianism. Act utilitarianism, Rule utilitarianism and Preference
utilitarianism.
3.1.1 ACT UTILITARIANISM
According to (Tavani, 2004), An act, X, is morally permissible if the consequences produced by
doing X result in the greatest good for the greatest number of persons affected by X.
Act Utilitarianism deals with the outcomes of individual actions. In this case, the greatest good is
done for the greatest number. Act Utilitarians believe that whenever we are deciding what to do,
we should perform the action that will create the greatest net utility. In their view, the principle of
utility—do whatever will produce the best overall results—should be applied on a case by case
basis. The right action in any situation is the one that yields more utility (i.e. creates more wellbeing) than other available actions.
3.1.2
RULE UTILITARIANISM
These are absolute rules established by society to allow greatest good to the greatest number.
Example: “Do not kill”. Rule Utilitarians adopt a two-part view that stresses the importance of
moral rules. According to rule utilitarianism,
o
Specific action is morally justified if it conforms to a justified moral rule.
o
Moral rule is justified if its inclusion into our moral code would create more utility
than other possible rules (or no rule at all).
According to this perspective, we should judge the morality of individual actions by reference to
general moral rules, and we should judge particular moral rules by seeing whether their acceptance
into our moral code would produce more well-being than other possible rules.
3.1.3 PREFERENCE UTILITARIANISM
Preference utilitarianism states that you should act in way that the person involved prefers, unless
that person is outweighed by others.
3.2
GENERAL CHARACTERISTICS OF UTILITARIANISM
There are five characteristics that effectively describe the utilitarianism theory. These include;
Consequentialism, Welfarism, Individualism, aggregation and maximization.
3.2.1 CONSEQUENTIALISM
This is the view that, the good or bad of an action depends entirely on the outcomes or
consequences of that act. This is technically referred to as ‘Teleological’. For instance, if you tell
a lie, it will only be considered a bad or negative action if that lie has harmful or bad effects.
Otherwise, that lie will not be considered wrong.
This utilitarian feature is of the view that, an act could be considered right or wrong if the effects
of that act yields right or wrong consequences. For instance, there is a consequentialist claim that
an act is right only if the outcomes of that act is as good as any other alternative act. The means
is usually not considered so long as it results to a positive consequence. Consequentialism tends
to justify the means by probably right means.
3.2.2
WELFARISM
Welfarism goes with views that how good or bad the outcomes of an action is depends solely on
facts about well-being, or welfare. That is how much happiness is derived.
Thus, good deeds or actions are the ones that increase the happiness or well-being(Utility) of the
people. Welfarism believes that morality is concerned with the wellbeing of an individual. It is
strongly believed that the whole point of morality is to make people better. Also to say that a thing
brings about the wellbeing of an individual, it must be something in their own best interest in the
most basic sense. This utilitarianism characteristic claims that one situation is better than another
if it has a greater amount of wellbeing.
3.2.3 INDIVIDUALISM
Utilitarian individualism sees communal action only as a way of protecting self-interests.
Individualism traces the source of value to individual entities such as animals and persons. For
instance, the only objects of moral regard are persons and animals rather than tribes, nations,
organizations etc.
3.2.4 AGGREGATION
This sees the value if an actions as determined by aggregation of the values of the individuals
involved in that particular action. Utilitarian aggregation is of the view that well being(utility) of
different people can be accumulated into a total which describes the overall welfare of all people.
3.2.5 MAXIMIZATION
This goes with the view that the best course of action is what can produce maximum or highest
level of welfare or happiness. This means the worth of a particular affair should be made as great
as possible.
4
THE ETHICS SURVEILLANCE VERSUS PRIVACY
Article 18(1) of the 1992 constitution of Ghana states that that “every person has the right to own
property either alone or in association with others”. Furthermore, 18(2) states that “No person shall
be subjected to the interference with the privacy of his home, property, correspondence or
communication except in accordance with law and as may be necessary in free and democratic
society for the protection of health or morals, for the prevention of disorder or crime or for the
protection of the rights of freedom of others”. Same in the United States, the Fourth Amendment
right draws a balance between privacy of a person and state interference by stating that, “The right
of the people to be secure in their persons, houses, papers, and effects, against unreasonable
searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly describing the place to be searched, and the
persons or things to be seized.
The above legislations enshrined in constitutions for many democracies around the world tends to
draw the balance between privacy and security. The nature and interpretation of these laws
indicated why privacy is not a natural right or absolute. In the sense that, if we were to have
absolute privacy to the things we do or have total control over, then it would be difficult to assess
how beneficial that will be for society. Government surveillance although has tendency for abuse
such as for political advantage or targeting of individuals perceived to be against government, the
main reason for such monitoring is to protect the interest of the state. In that regards, we look at
the balance between privacy and security in the context of the characteristics the utilitarianism
providing examples.
4.1 “ENEMIES OF THE STATE”, SURVEILLANCE INVESTIGATIVE WORK AT TEMA
HARBOUR
In the year 2011, ace investigator Anas Aremeyaw Anas conducted an investigation at the Tema
Harbour with the permission of the state, in this case, presidential accent. In the said investigation,
he planted surveillance cameras in several places at the Ghana port at Tema and was able to gather
a substantial amount of evidence that was used to prosecute and discipline corrupt officials. As a
result of his investigation, the state was able to save over Two hundred million cedis
($200,000,000).
In discussing the ethical implications of this action, we first look at the act. The whole idea
was conceived out of the fact that, the state was losing so much revenue at the Tema port due to
high corruption by officials. The state according to paternalism theory has the resources to carry
out any activity it deems fit in the interest of it citizens contracted someone to carry out this
investigation. In this case, the reason is one that will increase utility if it is proven that the state is
actually losing money through corruption. The consequences of such an act if successful will mean
that the state will benefit.
Considering the methodology, the investigator used, one might be tempted to apply some
communication surveillance laws that tends to say that, mounting surveillance cameras in a public
place would require notifying the public of such cameras available. Again, the other argument will
be that, the rights to privacy has been invaded. The notification of a person who is willing cause
harm to the state about processes being put in place to curb his actions will only make such a
person device other means of committing this act. Although, the person’s privacy is important and
sacred, it is only if what he does in his privacy is not of bad consequence that he is to be allowed
to enjoy his privacy. In theory, such surveillance such as wiretapping, cameras would require
authorization from a court or higher authorities. The question would be that could Anas have
gathered this evidence without invading into the privacy of these people as putting them on
cameras and showing them to the public? Privacy as defined as one space of control or
inaccessibility in this instance cannot be applied because the place, position or even duties
performed by these people are that which are assigned to them by the state. Hence, it is expected
that their individual actions would be one which benefits that state. The perception of corrupt
activities at the port which called for this investigation required “hard core” evidence as usually
used by the investigator and so the only means was to do surveillance through camera. The video
show widespread corruption with identified person transacting corrupt deals visually. As stated in
the article 18(2) of the Ghanaian constitution, there was reasonable evidence to call for this form
of invasion since the action by these people were detrimental to the utility of the state.
Considering the Evidence Act, 1975 (NRCD 323), Section 51 of the Act provides permissible
evidence, which says that
1. For the purpose of this Decree, "relevant evidence" means evidence, including evidence
relevant to the credibility of a witness or hearsay declarant, which makes the existence of
any fact that is of consequence to the determination of the action more or less probable
than it would be without the evidence.
2. All relevant evidence is admissible except as otherwise provided by any enactment.
3. No evidence is admissible except relevant evidence.
Although, the law contravenes similar laws in the United Kingdom and the United States, in the
case of the Ghana, the method used by the investigator in the gathering of the information is
recognized in the evidence act such that if the information gathered is credible, and this case,
helped the state deal with corrupt officials and increase revenue at the ports, then the law will
accept it. So in this case, the act of monitoring or surveillance used by Anas would be in the best
interest of most state.
The final analysis of the investigations is its benefit to the society. Was it worth the exercise? The
benefits derived from the act was enormous in the sense that over two hundred million cedi was
recovered and for a nation like Ghana, such an amount could be used to do a lot a projects or
provide social support. The consequence of the act was good since it led to the saving money for
the state, the Welfarism of the state would be good since such monies could be used to provide
social amenities which will benefit all.
Applying Kantianism theory of ethics, it would be seen that, the people involved in the corrupt
deals were using the state as a means to an end. Again, the morality of their actions could not be
universalized since they were not acting from good morals. The other point is that, the act to
monitor activities at the port unknowingly to the people there, all things being equal, was a moral
act since it was done with good intentions. We could also universalize the action and methodology
in the light of Kant theory and we could conclude that if there is perception of corruption in every
institution of the state, then the act and methodology could be used since it will identify such
corrupt deeds and save the state resources. To lay credence to this, the investigator has done several
cases using the same methodology and act which has been beneficial to the state (Wikipedia, Anas
Aremayaw Anas, 2011).
4.2 ETHICAL ASSESSMENT OF THE INTERCEPTION OF POSTAL PACKAGE AND
TELECOMUNICATIONS BILL
Rules both written and conventional are what guides the morals of a society. Without rules, people
may act in ways that may affect society negatively. With the increasingly threat to the global world
vices such as money laundering, terrorism, drug trade and human trafficking, it has become
imperative for rules or laws governing national security to be reviewed or new ones introduced.
As stated earlier, surveillance is one key mechanism by which lots of information can be gathered,
processed so as to preempt and prevent crimes that will affect the utility of society.
During a recent National Security Committee briefing, the NSA and FBI indicated that over 50
terrorist plots have been foiled due the the surveillance programs (Wikipedia, List of unsuccessful
terrorist plots in the United States post-9/11, n.d.). Again, in 2004, the US Department of Justice
reported that, “under the Patriot Act, 310 terrorist suspects have been arrested and 179 of whom
have been convicted.
In the light of these successes, it is obvious that, the act of surveillance tends to provide the society with the
security and safety it deserves, we must not overlook the tendency for abuse all in the name of national
security. We must evaluate the rules to see if we all were to follow the rules the way they have been drafted,
we will all end up being happy.
There are several issues surrounding the adoption of the surveillance law in Ghana, that is,
Interception of Postal Package and Telecommunication Act (ITTPA). The state obligation to
provide security is met with strong objection by civil society. We will ethically access the bill in
its current form to see if it will lead to the utility of society.
As a society, because it is difficult to monitor everyone’s action to see the benefits and harms that
comes from individual’s action, it has become necessary for the state to set rules that it believes if
we all follow, will lead to a better society. Secondly, it is expected that we all act in ways that are
beneficial and not harmful to society.
To access, it we first look at the morality of the bill. The objective as stated is to secure information
that will help protect the nation from crimes such as terrorist, drug trade, armed robberies among
others. Considering the current trend of terrorist attacks, one would be minded of the fact that, if
there was anyway we could intercept communication or merchandise legally which are used to
conduct these heinous acts, such a method should be highly welcomed. The motive behind this bill
is a good one as according to Kant, the motive is one that can be universalized. If having a bill that
will allow the state to have a legal access to information that could help curb activities that may
disturb the utility of the state, then according to Kant’s categorical imperative one, it would be
ethical to do so. Considering the bill from the utilitarianism perspective, the consequence of the
implementation of the bill as expected will lead to the interception of information relevant to state
security to make decisions on national security. As stated earlier, Ghana recently was placed on
high terrorist alert by national security. If we were to assume, that such information which led to
this warning was gotten through the communication surveillance, then the state will have been
saved from a catastrophe. In this regard, one could conclude that, the bill or its purpose is ethical.
On the other hand, the fear of invading people private lives and to what extent state security
apparatus can monitor is one that needs to be taken into consideration. The type of information,
who that information is being collected from and why that information is being collected is one
that should be considered in the legal framework that guides surveillance. The weight of security
seems to trump that of privacy as your personal happiness in a long way will be determined if you
have personal physical security. For example, if there was a terrorist attack in some shopping malls
in Ghana, one would be skeptical or even afraid of going to a shopping mall because, there will be
a feeling that it is an easy target for terrorist and that it may not be safe. Hence, the physical survival
is prerequisite for the enjoyment of other values such as privacy and security.
5
CONCLUSION
Increased technological innovations in the way people connect provides the society with several
issues such as how to balance our privacy and how the state needs to protect us from harms inherent
in the technological age. According to (Rue, 2013), Undue interference with individual’s privacy
can both directly and indirectly limit the free development and exchange of ideas. He intimates
that the restrictions of anonymity in communications, for example, have an evident chilling effect
on victims of all forms of violence and abuse, who may be reluctant to report for fear of double
victimization. These concerns are very relevant in a way that; it brings the need for us to situate
these concerns in an ethical manner. Once we have been able to prove that, it is ethical for state to
pursue it surveillance activities, what has become necessary is for us to draw a balance between
the right to privacy and security. Lack of judicial oversight, National security exceptions,
unregulated access to communication data, extra-territorial application of surveillance laws, extralegal surveillance, mandatory data retention and restrictions on encryption and key disclosure laws
are all concerns on national legal standard. There will always been the need to balance the right to
privacy and security. The state needs to adapt to the changing security needs and whiles doing so,
it should be guided by very strong legislation protecting civil liberties.
Ghana would need to quickly pass the Right to Information Bill, which is one that will make it
possible for the citizens to know what information is being collected and if such information is
collected legally. The United States balances the surveillance laws with the Freedom of
Information Act, FOIA. been the need to balance the right to privacy and security.
The state needs to adapt to the changing security needs and whiles doing so, it
should be guided by very strong legislation protecting civil liberties.
Bibliography
Alfino, & Mark. (2003). Reconstructing the right to privacy", Social Theory and Practice.
D'Agostino, F., & Gaus, G. (2008, 09). Contemporary Approaches to Social Contract. Standard
Encyclopaedia of Philosophy.
Eggleston, B. (2012). Utilitarianism. Encyclopaedia of Applied Ethic, 4, 452-458.
Mautner, T. (2010, 10 10). The Penguin Dictionary of Philosophy. Retrieved 03 23, 2016, from
Utilitarianism Resources: www.utilitarianism.com/actutil.htm
Mullikin, A., & Rahman, S. M. (2010, November). The Ethical Dilemma Of the USA Government
Wiretapping. International Journal of Managing Information Techonology (IJMT), 2(4), 32-39.
doi:10.5121/ijmit.2010.2403
Privacy International. (n.d.). Communications and Surveillance. Retrieved from Communications and
Surveillance: www.privacyinternational.org/node/10
Quinn, M. J. (2013). Ethics for the Information Age, 5th Edition. Seattle: Pearson Education, Inc.
Reiman, J. H. (1976). Privacy, Intimacy, and Personhood. Philosophy & Public Affairs, 6(1), 26-44.
Rue, F. L. (2013). Report of the Special Rapporteur on the promotion and protection of the right to
freedom of opinion and expression. New York: United Nations.
Schauer, F., & Sinnot-Armstrong, W. (1996). The Philosophy of Law: Classic and Contemporary reading
with Commentary. New York: Oxford University Press.
Trina, J. M. (2013, 10 14). Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly
Literature. Chicago Journals: The Library Quarterly, 81(2), 187-209.
Universal Declaration of Human Rights. (1994, 1994 7). Human Right Resources. Retrieved 03 22, 2015,
from Human Right Web Administrative Page: <http://www.hrweb.org/legal/udhr.html>
Warren, S., & Brandeis, L. (1890). The Right to Privacy. Harvard Law Review, 4, 193.
Wikipedia. (2011). Anas Aremayaw Anas. Retrieved from
https://en.m.wikipedia.org/wiki/Anas_Aremayaw_Anas
Wikipedia. (n.d.). List of unsuccessful terrorist plots in the United States post-9/11. Retrieved from List of
unsuccessful terrorist plots in the United States post-9/11:
https://en.wikipedia.org/wiki/List_of_unsuccessful_terrorist_plots_in_the_United_States_post9/11
Download