Nsa Domestic Surveillance from the Patriot Act to the Freedom Act: the Underlying History, Constitutional Basis, and the Efforts at Reform

Total Page:16

File Type:pdf, Size:1020Kb

Nsa Domestic Surveillance from the Patriot Act to the Freedom Act: the Underlying History, Constitutional Basis, and the Efforts at Reform View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Seton Hall University eRepository OMBRES.DOCX (DO NOT DELETE) 1/22/2015 10:30 AM NSA DOMESTIC SURVEILLANCE FROM THE PATRIOT ACT TO THE FREEDOM ACT: THE UNDERLYING HISTORY, CONSTITUTIONAL BASIS, AND THE EFFORTS AT REFORM Devon Ombres∗ I. INTRODUCTION ............................................................... 28 II. 9/11 TO TODAY—THE DEVELOPMENT OF THE NSA’S SURVEILLANCE PROGRAMS ........................... 29 III. THE FOURTH AMENDMENT THIRD PARTY DOCTRINE AND MASS DATA COLLECTION ............. 33 IV. LEGAL CHALLENGES TO DOMESTIC SURVEILLANCE AND JUDICIAL PUSHBACK ON THE THIRD PARTY DOCTRINE ............................................ 35 V. PROPOSED LEGISLATIVE REMEDIES TO MASS DOMESTIC SURVEILLANCE ......................................... 40 A. House Bills and Actions ............................................... 41 i. The Amash-Conyers Amendment .......................... 41 ii. The USA FREEDOM Act—Introduced Version ... 42 iii. Other House Bills ................................................... 44 B. Comprehensive Senate Bills and Actions ....................... 45 i. USA FREEDOM Act ............................................. 46 ii. Other Senate Bills ................................................... 49 VI. STRENGTHS AND WEAKNESSES OF THE BILLS AND POTENTIAL RESOLUTIONS ........................................... 50 VII. PREEMPTIVE PRESIDENTIAL ACTION ....................... 54 VIII. CONCLUSION ................................................................... 55 ∗ J.D. 2006 from Stetson University College of Law; L.L.M. 2013 from American University Washington College of Law; admitted in Florida, District of Columbia, United States Court of Appeals for the 11th Circuit, and United States District Court for the Middle District of Florida. 27 OMBRES.DOCX (DO NOT DELETE) 1/22/2015 10:30 AM 28 SETON HALL LEGISLATIVE JOURNAL [Vol. 39:1 I. INTRODUCTION Following the September 11, 2001 attacks, America’s signals intelligence community began growing exponentially in scope and power. In the forefront of this community was the National Security Agency (“NSA”), acting with the aid of the USA PATRIOT Act.1 Between 2001 and 2013, the scope of the NSA’s surveillance programs grew to include not only foreign communications, but also the mass collection of domestic metadata, including information on routing, senders, and recipients of phone calls, texts, and emails.2 The extent of domestic surveillance has come to light primarily through leaks of classified documents and specifically, those occurring in May 2013, by former NSA contractor, Edward Snowden.3 The NSA is now facing unprecedented challenges to the legality of these programs from private citizens bringing Fourth Amendment actions, technology companies demanding more transparency about the demands being placed on them by Foreign Intelligence Service Court (“FISC”) orders, and now Congress introducing bipartisan legislation to counteract the PATRIOT Act’s provisions and the domestic surveillance that the NSA conducts.4 This Article will discuss the historical post-9/11 timeline relative to the domestic surveillance program. It addresses the underlying historical and constitutional concept of the Fourth Amendment, Third Party Doctrine, which the federal government is relying upon to justify the legality of mass domestic surveillance, as well as to defend legal challenges to the programs. This Article will provide an analysis of legislative proposals addressing NSA surveillance overreach, including the USA FREEDOM Act and its subsequent manager’s amendment, 1 United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, Pub. L. No. 107–56, 115 Stat. 272 (codified as amended in scattered sections of 5, 8, 10, 12, 15, 18, 20–22, 28, 31, 42, 47, 49–50 U.S.C.). 2 The NSA utilized contact chaining as a process of “building a network graph that models the communication . patte[rn]s of targeted entities . and their associates from the communication sent or received by the targets.” OFFICE OF THE INSPECTOR GENERAL, ST- 09-0002, 13 (Mar. 24, 2009), available at http://www.theguardian.com/world/interactive/2013/jun/27/nsa-inspector-general-report- document-data-collection [hereinafter OIG Report]. 3 Mirren Gidda, Edward Snowden and the NSA Files—Timeline, THE GUARDIAN (Aug. 21, 2013, 5:54PM), http://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa- files-timeline. 4 Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection, and Online Monitoring Act, H.R. 3361, S. 1599, 113th Cong. § 1 (2013) [hereinafter FREEDOM Act]. OMBRES.DOCX (DO NOT DELETE) 1/22/2015 10:30 AM 2015] NSA DOMESTIC SURVEILLANCE 29 address their strengths and weaknesses, and discuss potential courses of legislative and judicial action to address these issues.5 Part II of this Article addresses the timeline by which the NSA’s surveillance programs were developed; Part III addresses the Third Party Doctrine under the Fourth Amendment; Part IV discusses legal challenges to the NSA surveillance programs before and after the Snowden leaks; Part V analyzes legislation proposed during the 113th Congress that addresses domestic NSA surveillance; Part VI looks at the strengths and weakness of the proposed legislation; Part VII reviews presidential action on the surveillance reforms; and Part VIII concludes this Article by discussing further judicial and legislative actions to address domestic surveillance concerns and the need to maintain a balance between privacy and security as technology advances. II. 9/11 TO TODAY—THE DEVELOPMENT OF THE NSA’S SURVEILLANCE PROGRAMS Immediately after the 9/11 attacks, the NSA took the first steps toward developing mass surveillance infrastructure as we know it today. First, on September 14, 2001, NSA Director General Michael Hayden approved targeted surveillance of specific, preapproved telephone numbers generating communications between the United States and foreign countries with known terrorist activities.6 The congressional intelligence committees were made aware of these targeted collections shortly thereafter, and by October 4, 2001, authority had been granted to collect content data for such calls and emails.7 The NSA initially pushed back at Vice President Dick Cheney’s Office’s suggestion that Executive Order (“EO”) 12333 permitted the data collection program to apply toward intercepting domestic communications.8 Regardless, the program began expanding when 5 Id. 6 See OIG Report, supra note 2, at 3 (asserting that by September 26, 2001, the NSA anticipated collecting all telephonic metadata between the U.S. and Afghanistan). 7 OIG Report, supra note 2, at 7. 8 Exec. Order No. 12,333, Part 2.3, 3 C.F.R. 1981 (1981) (stating “Collection of Information. Agencies within the Intelligence Community are authorized to collect, retain or disseminate information concerning United States persons only in accordance with procedures established by the head of the agency concerned and approved by the Attorney General, consistent with the authorities provided by Part 1 of this Order . of the following types of information; (c) Information obtained in the course of a lawful foreign intelligence, counterintelligence, international narcotics or international terrorism investigation; (d) Information needed to protect the safety of any persons or organizations, including those who OMBRES.DOCX (DO NOT DELETE) 1/22/2015 10:30 AM 30 SETON HALL LEGISLATIVE JOURNAL [Vol. 39:1 Attorney General John Ashcroft signed off on its implementation per EO 12333 and the NSA General Counsel declared the program legal on October 5, 2001.9 By late 2002, the NSA was reaching out to telecommunication companies (“telecoms”) to gain assistance with the surveillance program and in early 2003, installed a system at one of AT&T’s San Francisco locations to collect and analyze communications data.10 The NSA also reached voluntary agreements with three unidentified companies to share information under the program’s authority, allowing it to gain access to eighty-one percent of all international telephone calls.11 Formal letters requested information regarding communications traffic that may terminate in the United States, aggregated call record information, and computer-to-computer data.12 By 2004, the Federal Bureau of Investigation (“FBI”) and Central Intelligence Agency (“CIA”) became involved to improve collaborative analytics.13 Despite some pushback from the telecoms, the data collection continued.14 In 2004, Attorney General Ashcroft forwarded letters necessitating continued cooperation, stating that the law for data collection required no warrant or court order.15 In July 2004, the FISC began issuing orders permitting the collection of metadata under the program pursuant to pen register (“PR”) and trap and trace (“TT”) are targets, victims or hostages of international terrorist organizations; . (i) Incidentally obtained information that may indicate involvement in activities that may violate federal, state, local or foreign laws . .”). 9 Electronic Frontier Foundation, Timeline of NSA Domestic Spying, https://www.eff.org/nsa-spying/timeline (last visited Nov. 21, 2014) (citing ERIC LICHTBLAU, BUSH’S LAW: THE REMAKING OF AMERICAN JUSTICE (First Anchor Books 2009) (stating White House associates “shoved” the order in front of Ashcroft and “told him to sign it.”)); see OIG Report, supra note 2, at 9, 11 (conveying
Recommended publications
  • R E P O R T Select Committee on Intelligence United
    1 114TH CONGRESS " ! REPORT 1st Session SENATE 114–8 R E P O R T OF THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE COVERING THE PERIOD JANUARY 3, 2013 TO JANUARY 5, 2015 MARCH 31, 2015.—Ordered to be printed Filed under authority of the order of the Senate of March 27 (legislative day, March 26) 2015 U.S. GOVERNMENT PUBLISHING OFFICE 49–010 WASHINGTON : 2015 VerDate Sep 11 2014 06:43 Apr 01, 2015 Jkt 049010 PO 00000 Frm 00001 Fmt 4012 Sfmt 4012 E:\HR\OC\SR008.XXX SR008 SSpencer on DSK4SPTVN1PROD with REPORTS E:\Seals\Congress.#13 SELECT COMMITTEE ON INTELLIGENCE RICHARD BURR, North Carolina, Chairman DIANNE FEINSTEIN, California, Vice Chairman JAMES E. RISCH, Idaho RON WYDEN, Oregon DANIEL COATS, Indiana BARBARA A. MIKULSKI, Maryland MARCO RUBIO, Florida MARK R. WARNER, Virginia SUSAN M. COLLINS, Maine MARTIN HEINRICH, New Mexico ROY BLUNT, Missouri ANGUS S. KING, Jr., Maine JAMES LANKFORD, Oklahoma MAZIE K. HIRONO, Hawaii TOM COTTON, Arkansas MITCH MCCONNELL, Kentucky, Ex Officio Member HARRY REID, Nevada, Ex Officio Member JOHN MCCAIN, Arizona, Ex Officio Member JACK REED, Rhode Island, Ex Officio Member CHRIS JOYNER, JACK LIVINGSTON, Staff Directors DAVID GRANNIS, Minority Staff Director DESIREE T. SAYLE, Chief Clerk During the period covered by this report, the composition of the Select Committee on Intel- ligence was as follows: DIANNE FEINSTEIN, California, Chairman SAXBY CHAMBLISS, Georgia, Vice Chairman JOHN D. ROCKEFELLER IV, West Virginia RICHARD BURR, North Carolina RON WYDEN, Oregon JAMES E. RISCH, Idaho BARBARA A. MIKULSKI, Maryland DANIEL COATS, Indiana MARK UDALL, Colorado MARCO RUBIO, Florida MARK R.
    [Show full text]
  • Membership Lists, Metadata, and Freedom of Association's Specificity Requirement
    Membership Lists, Metadata, and Freedom of Association's Specificity Requirement KATHERINE J. STRANDBURG* Over the past year, documents revealed by leaker Edward Snowden and declassified by the government have provided a detailed look at some aspects of the National Security Agency's (NSA's) surveillance of electronic communications and transactions. Attention has focused on the NSA's mass collection from major telecommunications carriers of so-called "telephony metadata," which includes dialing and dialed numbers, call time, duration, and the like.' The goal of comprehensive metadata collection is what I have elsewhere called "relational surveillance"2-to follow "chains of communications" between "telephone numbers associated with known or suspected terrorists and other telephone numbers" and then to "analyze those connections in a way that can help identify terrorist * Alfred B. Engelberg Professor of Law, New York University School of Law. Professor Strandburg acknowledges the generous support of the Filomen D'Agostino and Max E. Greenberg Research Fund. 1 The term "metadata" has been widely adopted in discussing the NSA's data collection activities and so I will use it here. When one moves beyond call traffic data, however, the term's meaning in the data surveillance context is problematic, ill-defined and may obscure the need for careful analysis. As one illustration of these issues, consider NSA documents recently made public in connection with news reports of NSA monitoring of text messages, which refer, in language that would have made the Red Queen proud, to "content derived metadata." See James Ball, NSA DishfirePresentation on Text Message Collection-Key Extracts, THE GUARDIAN, Jan.
    [Show full text]
  • Summary of U.S. Foreign Intelligence Surveillance Law, Practice, Remedies, and Oversight
    ___________________________ SUMMARY OF U.S. FOREIGN INTELLIGENCE SURVEILLANCE LAW, PRACTICE, REMEDIES, AND OVERSIGHT ASHLEY GORSKI AMERICAN CIVIL LIBERTIES UNION FOUNDATION AUGUST 30, 2018 _________________________________ TABLE OF CONTENTS QUALIFICATIONS AS AN EXPERT ............................................................................................. iii INTRODUCTION ......................................................................................................................... 1 I. U.S. Surveillance Law and Practice ................................................................................... 2 A. Legal Framework ......................................................................................................... 3 1. Presidential Power to Conduct Foreign Intelligence Surveillance ....................... 3 2. The Expansion of U.S. Government Surveillance .................................................. 4 B. The Foreign Intelligence Surveillance Act of 1978 ..................................................... 5 1. Traditional FISA: Individual Orders ..................................................................... 6 2. Bulk Searches Under Traditional FISA ................................................................. 7 C. Section 702 of the Foreign Intelligence Surveillance Act ........................................... 8 D. How The U.S. Government Uses Section 702 in Practice ......................................... 12 1. Data Collection: PRISM and Upstream Surveillance ........................................
    [Show full text]
  • S. 1123, the USA Freedom Act of 2015 Dear Members of the Senate
    WASHINGTON LEGISLATIVE OFFICE May 23, 2015 RE: S. 1123, the USA Freedom Act of 2015 Dear Members of the Senate: Section 215 of the Patriot Act expanded the reach of the intelligence agencies in unprecedented ways and is the basis for collecting and retaining records on AMERICAN CIVIL millions of innocent Americans. The ACLU opposed Section 215 when it LIBERTIES UNION WASHINGTON was introduced, has fought it at each successive reauthorization, and urges LEGISLATIVE OFFICE Congress to let it sunset on June 1st. 915 15th STREET, NW, 6 TH FL WASHINGTON, DC 20005 T/202.544.1681 F/202.546.0738 This week, the Senate is scheduled to vote on S. 1123, the USA Freedom Act WWW.ACLU.ORG of 2015, which proposes modest reforms to Section 215, Section 214 (the pen MICHAEL W. MACLEOD-BALL register and trap and trace device provision, “PR/TT”), and national security ACTING DIRECTOR letter authorities. The bill also seeks to increase transparency over government NATIONAL OFFICE surveillance activities but could be construed to codify a new surveillance 125 BROAD STREET, 18 TH FL. regime of more limited, yet still massive scope. NEW YORK, NY 10004-2400 T/212.549.2500 Earlier this month, the Second Circuit unequivocally ruled that the OFFICERS AND DIRECTORS 1 SUSAN N. HERMAN government’s bulk metadata program violated the law. In light of this PRESIDENT decision, it is clear that more robust surveillance reform is needed. Though an ANTHONY D. ROMERO improvement over the status quo in some respects, the USA Freedom Act EXECUTIVE DIRECTOR does not go far enough to rein in NSA abuses and contains several concerning ROBERT REMAR provisions.
    [Show full text]
  • Introduction the Intelligence Community (IC) – General Information
    Guide to Posted Documents Regarding Use of National Security Authorities – Updated as of January, 2020 Contents Introduction .................................................................................................................................................. 1 The Intelligence Community (IC) – General Information .............................................................................. 1 IC Framework for Protecting Civil Liberties and Privacy and Enhancing Transparency ................................ 3 Reports on Use of National Security Authorities. ......................................................................................... 5 Section 702: - Overviews............................................................................................................................... 6 Section 702: Targeting and Minimization ..................................................................................................... 7 Section 702: Compliance, Oversight, and Other Documents ....................................................................... 8 FISA: Other Provisions ................................................................................................................................... 9 FISA: FISC and FISCR Opinions..................................................................................................................... 10 Executive Order 12333 ................................................................................................................................ 11 Presidential
    [Show full text]
  • Case 4:16-Cv-02041-HSG Document 68 Filed 08/23/18 Page 1 of 31
    Case 4:16-cv-02041-HSG Document 68 Filed 08/23/18 Page 1 of 31 1 AARON MACKEY (SBN 286647) [email protected] 2 NATHAN D. CARDOZO (SBN 259097) [email protected] 3 ELECTRONIC FRONTIER FOUNDATION 815 Eddy Street 4 San Francisco, CA 94109 Telephone: (415) 436-9333 5 Facsimile: (415) 436-9993 6 Attorneys for Plaintiff 7 ELECTRONIC FRONTIER FOUNDATION 8 UNITED STATES DISTRICT COURT 9 FOR THE NORTHERN DISTRICT OF CALIFORNIA 10 SAN FRANCISCO DIVISION 11 ELECTRONIC FRONTIER FOUNDATION, ) Case No. 16-cv-02041-HSG 12 ) Plaintiff, ) NOTICE OF MOTION AND CROSS 13 ) MOTION FOR PARTIAL SUMMARY v. ) JUDGMENT AND OPPOSITION TO 14 ) DEFENDANTS’ MOTION FOR ) UNITED STATES DEPARTMENT PARTIAL SUMMARY JUDGMENT 15 ) OF JUSTICE, ) Date: November 8, 2018 16 ) Time: 2:00 pm Defendant. ) Courtroom: Courtroom 2, 17 ) Oakland Courthouse ) Hon. Haywood S. Gilliam Jr. 18 19 20 21 22 23 24 25 26 27 28 i. i PLAINTIFF’S CROSS MPSJ AND OPP TO DEFENDANT’S MPSJ Case No. 4:16-cv-02041-HSG Case 4:16-cv-02041-HSG Document 68 Filed 08/23/18 Page 2 of 31 1 NOTICE OF MOTION 2 PLEASE TAKE NOTICE that on November 8, 2018 at 2:00 pm in Courtroom 2, 4th Floor, 3 United States Courthouse, 1301 Clay Street, Oakland, California 94612, Plaintiff Electronic Frontier 4 Foundation (“EFF”), will, and hereby does, cross move this Court for partial summary judgment. 5 6 Pursuant to Federal Rule of Civil Procedure 56, EFF seeks a court order requiring the 7 government to release records under the Freedom of Information Act, 5 U.S.C.
    [Show full text]
  • IN the EUROPEAN COURT of HUMAN RIGHTS App No. 24960/15 10 HUMAN RIGHTS
    IN THE EUROPEAN COURT OF HUMAN RIGHTS App No. 24960/15 10 HUMAN RIGHTS ORGANIZATIONS AND OTHERS – v – THE UNITED KINGDOM THIRD PARTY INTERVENTION OF THE ELECTRONIC PRIVACY INFORMATION CENTER Introduction 1. The Electronic Privacy Information Center (“EPIC”) welcomes the opportunity to submit these written comments pursuant to leave granted on February 26, 2016, by the President of the First Section under Rule 44 §3 of the Rules of the Court. These submissions do not address the facts or merits of the applicants’ case. 2. EPIC is a public interest, non-profit research and educational organization based in Washington, D.C. 1 EPIC was established in 1994 to focus public attention on emerging privacy and civil liberties issues and to protect privacy, freedom of expression, and democratic values in the information age. EPIC routinely files amicus briefs in U.S. courts, pursues open government cases, defends consumer privacy, coordinates non- profit participation in international policy discussions, and advocates before legislative and judicial organizations about emerging privacy and civil liberties issues. EPIC is a leading privacy and freedom of information organization in the US with special expertise in government surveillance related legal matters. 3. The matter before the Court in 10 Human Rights Organizations and Others v. the United Kingdom impacts the human rights to privacy, data protection and freedom of expression of people around the world, which is reflected also by the variety of the applicants’ affiliations. The matter before the Court is an issue of broad international importance because it involves arrangements to transfer personal data between the United States and European countries.
    [Show full text]
  • H.R. 3361, the USA FREEDOM ACT FACT SHEET
    H.R. 3361, The USA FREEDOM ACT FACT SHEET The USA FREEDOM Act reforms intelligence-gathering programs to enhance civil liberty protections while preserving traditional operational capabilities to protect national security. The Act prohibits the bulk collection of records under Section 215 of the PATRIOT Act; the FISA pen register, trap and trace statute; and the national security letter statutes. This goes further than the President’s plan in that it prohibits the bulk collection of all tangible things and not just telephone records. The Act preserves traditional operational capabilities. The government may continue to collect foreign intelligence information under each of these authorities. However, the government must now base the use of these authorities on a “specific selection term” defined to preclude indiscriminate, bulk record collection. The Act creates a new, narrowly-tailored authority for the collection of call detail records. This new authority leaves the records in the hands of the providers, is limited to only international terrorism investigations, and requires the government to obtain a court order on a case-by-case basis to request the records from the providers. The Act imposes limitations on the new call detail record authority. Production of call detail records cannot exceed 180 days unless the government seeks permission of the court to renew the order. The government is limited to only two “hops”—i.e., the call detail records associated with the initial seed and the call detail records associated with the records returned in the initial “hop.” The government is also required to promptly destroy records that do not contain foreign intelligence information.
    [Show full text]
  • SPECIAL REPORT ESPIONAGE November 12Th 2016 Shaken and Stirred
    SPECIAL REPORT ESPIONAGE November 12th 2016 Shaken and stirred 20161012_SR_ESPIONAGE_001.indd 1 27/10/2016 13:41 SPECIAL REPORT ESPIONAGE Shaken and stirred Intelligence services on both sides of the Atlantic have struggled to come to terms with new technology and a new mission. They are not done yet, writes Edward Carr IN THE SPRING thaw of 1992 a KGB archivist called Vasili Mitrokhin CONTENTS walked into the British embassy in Riga. Stashed at the bottom ofhis bag, beneath some sausages, were copies of Soviet intelligence files that he 5 Technology had smuggled out of Russia. Before the year was out MI6, Britain’s for- Tinker, tailor, hacker, spy eign-intelligence service, had spirited away Mitrokhin, his family and six large cases packed with KGB records which he had kept hidden in a milk 7 Governance Standard operating churn and some old trunks under the floor ofhis dacha. procedure The pages of “The Mitrokhin Archive”, eventually published in 1999, are steeped in vodka and betrayal. They tell the stories of notorious 8 Edward Snowden spies like Kim Philby, a British intelligence officer who defected to Russia You’re US government in 1963. And they exposed agents like Melita Norwood, who had quietly property worked for the KGB for 40 years from her home in south-east London, then shot to fame as a great-gran- 10 China and Russia Happenstance and enemy ny. Her unrelenting Marxist refus- action al to shop at Britain’s capitalist su- permarkets earned her the 12 How to do better headline: “The Spy Who Came in The solace of the law from the Co-op”.
    [Show full text]
  • Information Awareness Office
    Article Talk Read Edit View history Search Wikipedia Wiki Loves Monuments: Photograph a monument, help Wikipedia and win! Learn more Main page Contents Featured content Information Awareness Office Current events From Wikipedia, the free encyclopedia Random article Donate to Wikipedia The Information Awareness Wikipedia store Office (IAO) was established by the Interaction United States Defense Advanced Help Research Projects Agency About Wikipedia (DARPA) in January 2002 to bring Community portal together several DARPA projects Recent changes focused on applying surveillance Contact page and information technology to track Tools and monitor terrorists and other What links here asymmetric threats to U.S. national Related changes security by achieving "Total Upload file Information Awareness" Special pages (TIA).[4][5][6] Permanent link [1][2] Page information This was achieved by creating Information Awareness Office seal (motto: lat. scientia est potentia – knowledge is Wikidata item enormous computer databases to power[3]) Cite this page gather and store the personal information of everyone in the Print/export Part of a series on United States, including personal e- Create a book Global surveillance Download as PDF mails, social networks, credit card Printable version records, phone calls, medical records, and numerous other sources, without Languages any requirement for a search Català warrant.[7] This information was then Disclosures Deutsch Origins · Pre-2013 · 2013–present · Reactions analyzed to look for suspicious Français Systems activities, connections between Italiano XKeyscore · PRISM · ECHELON · Carnivore · [8] Suomi individuals, and "threats". Dishfire · Stone Ghost · Tempora · Frenchelon Svenska Additionally, the program included · Fairview · MYSTIC · DCSN · Edit links funding for biometric surveillance Boundless Informant · Bullrun · Pinwale · Stingray · SORM · RAMPART-A technologies that could identify and Agencies track individuals using surveillance NSA · BND · CNI · ASIO · DGSE · Five Eyes · [8] cameras, and other methods.
    [Show full text]
  • Report on the Government's Use of the Call Detail Records Program
    Privacy and Civil Liberties Oversight Board Report on the Government’s Use of the Call Detail Records Program Under the USA Freedom Act Working to ensure that efforts by the Executive Branch to protect the nation from terrorism appropriately safeguard privacy and civil liberties. February 2020 Privacy and Civil Liberties Oversight Board • PCLOB.gov • [email protected] TOP SECRET//SI//NOFORN Board Members Adam I. Klein, Chairman Jane E. Nitze Edward W. Felten Travis LeBlanc Aditya Bamzai TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Table of Contents (U) Executive Summary ................................................................................................................. 1 I. (U) Introduction ..................................................................................................................... 4 II. (U) NSA’s Collection of CDRs under the USA Freedom Act ............................................ 13 III. (U) Operational Use of the USA Freedom Act CDR Program ............................................ 25 IV. (U) Legal Analysis ............................................................................................................... 33 V. (U) Analysis of Privacy Risks.............................................................................................. 53 VI. (U) Statement of Chairman Adam Klein ............................................................................. 59 VII. (U) Statement of Board Members Ed Felten and Travis LeBlanc ....................................... 68 VIII. (U) Statement
    [Show full text]
  • The Structural Constitution and the Challenge of Mass Surveillance
    Before Privacy, Power: The Structural Constitution and the Challenge of Mass Surveillance Deborah Pearlstein* INTRODUCTION The rich legal literature that has grown up to assess the constitutionality of bulk communications collection by the government has focused overwhelmingly—and understandably—on the challenge such programs pose to particular claims of individual right against the state. For scholars focused on the Fourth Amend- ment,1 bulk collection threatens the constitutional protection of the “privacy, dignity, and security of persons against certain arbitrary and invasive acts” by the government,2 and in particular implicates the prohibition against warrantless searches that violate an individual’s “reasonable expectation of privacy.”3 Less frequently, scholars have highlighted various First Amendment interests impli- cated by bulk data collection—the danger that government collection may chill individual associational and expressive activities,4 as well as the intellectual freedom to think and explore ideas and information without fear of state record keeping.5 While varying widely in its conclusions, this work generally begins by conceptualizing the potential constitutional harm such programs pose as arising in discrete areas of the doctrinal Bill of Rights. Yet attempting to describe what seems troubling about bulk collection in terms of individual rights alone has significant doctrinal and conceptual limits. In doctrinal terms, for instance, Fourth Amendment jurisprudence has not yet identified any constitutionally cognizable harm when the government searches information that has been shared with a third party—even in an era when vast quantities of individuals’ most intimate data is possessed in electronic form by * Professor, Cardozo Law School, Yeshiva University. The author wishes to thank William C.
    [Show full text]