The Synergy of Privacy and Speech

Total Page:16

File Type:pdf, Size:1020Kb

The Synergy of Privacy and Speech THE SYNERGY OF PRIVACY AND SPEECH Nicole B. Cásarez* TABLE OF CONTENTS INTRODUCTION ............................................................................. 814 I. UNDERSTANDING THE USA FREEDOM ACT AND EXECUTIVE ORDER 12333 ......................................................................... 822 A. The USA Freedom Act ..................................................... 823 B. Executive Order 12333 ................................................... 827 II. COMMUNICATIONS METADATA AND THE FOURTH AMENDMENT .......................................................................... 836 A. Mail Privacy and the Fourth Amendment Path ................... 836 B. Electronic Eavesdropping and False Friends ........................ 838 C. Communications Metadata and the Third Party Doctrine ..... 840 D. The Future of the Third Party Doctrine .............................. 844 III. COMMUNICATIONS PRIVACY AND THE FIRST AMENDMENT .... 847 A. The Content/Metadata Distinction and the First Amendment ................................................................. 850 B. Is the Chilling Effect Real? ............................................... 853 C. If a Chilling Effect Exists, Is It Legally Cognizable under the First Amendment? ......................................................... 859 D. The Problem of Standing ................................................. 865 IV. AT THE CONVERGENCE OF PRIVACY AND SPEECH ................... 870 A. “Scrupulous Exactitude” ................................................. 872 B. The Keith Case ............................................................. 875 C. Applying Keith to Bulk Collection of Domestic Communications Metadata ............................................ 880 D. A Way Forward ............................................................. 888 * Visiting Professor of Law, University of Houston Law Center; Professor, Communication, University of St. Thomas, Houston, Texas. University of Texas, B.J., 1976, J.D. 1979; Uni- versity of Houston, M.A. 1991. I would like to thank Peter Linzer and Emily Berman, both of the University of Houston Law Center, for their encouragement and their help- ful comments on earlier drafts. Any errors that remain are mine alone. 813 814 JOURNAL OF CONSTITUTIONAL LAW [Vol. 18:3 CONCLUSION ................................................................................. 893 INTRODUCTION However history ultimately judges Edward Snowden, his 2013 rev- elations regarding secret bulk collection of domestic phone records by the National Security Agency (“NSA”) eroded many Americans’ trust in their government, as well as their confidence in the privacy of their electronic conversations.1 Americans were shocked and an- gered to learn that their government had been collecting all kinds of information about their communications, without serious judicial su- pervision and when most or all of the data was domestic. Fears that America had turned into a surveillance state fueled sales of encryp- tion technology2 and were reflected in both the media and popular culture.3 1 See, e.g., Pew Research Center, Public Perceptions of Privacy and Security in the Post-Snowden Era, 23–25 (Nov. 12, 2014), http://www.pewinternet.org/ files/2014/11/PI_Public PerceptionsofPrivacy_111214.pdf [hereinafter Pew 2014 Study] (finding that, with respect to landline phones, cell phones, text messaging, instant messaging, email, and social me- dia messaging, “there is not one mode through which a majority of the American public feels ‘very secure’ sharing private information with another trusted person or organiza- tion”). 2 See e.g., Bill Flook, There’s No Business Like Snowden Business, WASH. BUS. J. (July 25, 2014), http://www.bizjournals.com/washington/print-edition/2014/07/25/ theres-no-business- like-snowden-business.html?page=all (describing how consumer interest in encryption technology increased following the Snowden disclosures). 3 Journalists covering the Snowden revelations inevitably invoked George Orwell. See PEN Surveillance Mapping Metaphor Project, PEN American Ctr., http://www. pen.org/ infographic/pen-surveillance-metaphor-mapping-project (illustrating that Orwell’s novel 1984 was the only literary work referred to in the PEN America survey). Government surveillance also inspired art exhibits, songs, and even a popular Holly- wood children’s movie. See, e.g., Peter Maass, Art in a Time of Surveillance, First Look, THE INTERCEPT, Nov. 13, 2014, https://firstlook.org/theintercept/2014/11/13/art- surveillance-explored-artists; John Hanlon, Why The LEGO Movie is the new Nineteen Eighty-Four, THE WEEK, Feb. 7, 2014, http://theweek.com/article/index/256154/why- the-lego-movie-is-the-new-nineteen-eighty-four (comparing the influence of government surveillance in Orwell’s 1984 and The LEGO Movie); Rock, Paper, Cynic, Hello NSA (A Love Song of Mass Surveillance), YOUTUBE (Feb. 11, 2014), https://www.youtube.com/ watch?v=Eiu-7Ij6CWI. Feb. 2016] SYNERGY OF PRIVACY AND SPEECH 815 After two years of public debate and political grandstanding, Con- gress finally enacted the USA FREEDOM Act,4 and news reports trumpeted the end of government bulk collection of American tele- phone records.5 No longer could the government use Section 215 of the USA PATRIOT Act6 to force telecommunications providers to de- liver to the NSA, on a daily basis, the “metadata”—transmittal infor- mation including the numbers dialed, time, date, and duration7— associated with most Americans’ phone calls.8 Both President Barack Obama and Edward Snowden applauded the passage of the new law,9 the latter calling it “a historic victory for the rights of every citizen.”10 4 Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-Collection, and Online Monitoring Act of 2015, Pub. L. No. 114-23, 129 Stat. 268, codified at 50 U.S.C. § 1861 (2015) [hereinafter Freedom Act]. 5 See, e.g., David Cole, Reining in the NSA, N.Y. TIMES REV. OF BOOKS (June 2, 2015), http://www.nybooks.com/blogs/nyrblog/2015/jun/02/nsa-surveillance-congress-sunset; Sabrina Siddiqui, Congress Passes NSA Surveillance Reform in Vindication for Snowden, THE GUARDIAN (June 3, 2015), http://www.theguardian.com/us-news/2015/ jun/02/ congress-surveillance-reform-edward-snowden. 6 Uniting and Strengthening America by Providing Appropriate Tools Required to Inter- cept and Obstruct Terrorism Act of 2001, Pub. L. 107-56, 115 Stat. 272 (codified in scat- tered titles of the U.S.C.) [hereinafter Patriot Act]. Section 215 of the Patriot Act amended the “business records” provision of the Foreign Intelligence Surveillance Act of 1978, Pub. L. No. 95-511, 92 Stat. 1783 (codified as amended in scattered sections of 8, 18 and 50 U.S.C.) [hereinafter FISA]. The business records provision authorizes the FBI Di- rector or a designee to seek: an order requiring the production of any tangible things (including books, rec- ords, papers, documents, and other items) for an investigation to obtain intelli- gence information not concerning a United States person or to protect against in- ternational terrorism or clandestine intelligence activities, provided that such investigation of a United States person is not conducted solely upon the basis of activities protected by the first amendment to the Constitution. Patriot Act, codified as amended at 50 U.S.C. § 1861(a). The application for such author- ity need only “specify that the records concerned are sought for an authorized investiga- tion . to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities.” Id., codified as amended at 50 U.S.C. § 1861(b)(2). 7 See David Medine et al., Report on the Telephone Records Program Conducted Under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court, Pri- vacy & Civil Liberties Oversight Bd. 8 (2014), https://www.pclob. gov/library/215- Report_on_the_Telephone_Records_Program.pdf [hereinafter PCLOB Section 215 Re- port] (defining “metadata” for phone calls and emails). 8 To be more precise, the Freedom Act authorized the government to restart the former Section 215 program and operate it for six months while the NSA and the telecommuni- cations providers transition to the new, Freedom Act system. Freedom Act, supra note 4, at § 109(a). 9 See Jennifer Steinhauer & Jonathan Weisman, U.S. Surveillance in Place Since 9/11 is Sharply Limited, N.Y. TIMES, June 3, 2015, at A1 (noting that “Mr. Obama was quick to praise pas- sage of the legislation and to scold those who opposed it”). 10 Edward J. Snowden, Edward Snowden: The World Says No to Surveillance, N.Y. TIMES, June 5, 2015, at A27. 816 JOURNAL OF CONSTITUTIONAL LAW [Vol. 18:3 Politicians and professors labeled the Freedom Act the most signifi- cant surveillance reform in decades, describing it as a reflection of the popular belief that the government has no business spying on Americans’ calls.11 Some went so far as to give credit to Snowden for launching a debate that led to legislative reform, resulting in a para- digmatic example of the democratic process at work.12 In fact, however, these laudatory remarks overstate what the Free- dom Act actually accomplished. While the new law imposes some limits on the government’s ability to gather Americans’ domestic communications records under the Patriot Act, the Freedom Act leaves untouched the government’s power to collect most (if not all) of these same records under other legal authorities.
Recommended publications
  • In Re Motion of Propublica, Inc. for the Release of Court Records [FISC
    IN RE OPINIONS & ORDERS OF THIS COURT ADDRESSING BULK COLLECTION OF DATA Docket No. Misc. 13-02 UNDER THE FOREIGN INTELLIGENCE SURVEILLANCE ACT IN RE MOTION FOR THE RELEASE OF Docket No. Misc. 13-08 COURT RECORDS IN RE MOTION OF PROPUBLICA, INC. FOR Docket No. Misc. 13-09 THE RELEASE OF COURT RECORDS BRIEF OF AMICI CURIAE THE REPORTERS COMMITTEE FOR FREEDOM OF THE PRESS AND 25 MEDIA ORGANIZATIONS, IN SUPPORT OF THE NOVEMBER 6,2013 MOTION BY THE AMERICAN CIVIL LIBERTIES UNION, ET AL, FOR THE RELEASE OF COURT RECORDS; THE OCTOBER 11, 2013 MOTION BY THE MEDIA FREEDOM AND INFORMATION ACCESS CLINIC FOR RECONSIDERATION OF THIS COURT'S SEPTEMBER 13, 2013 OPINION ON THE ISSUE OF ARTICLE III STANDING; AND THE NOVEMBER 12,2013 MOTION OF PRO PUBLICA, INC. FOR RELEASE OF COURT RECORDS Bruce D. Brown The Reporters Committee for Freedom of the Press 1101 Wilson Blvd., Suite 1100 Arlington, VA 22209 Counsel for Amici Curiae November 26. 2013 TABLE OF CONTENTS TABLE OF CONTENTS ................................................................................................................ ii TABLE OF AUTHORITIES ......................................................................................................... iii IDENTITY OF AMICI CURIAE .................................................................................................... 1 SUMMARY OF THE ARGUMENT ............................................................................................. 2 ARGUMENT .................................................................................................................................
    [Show full text]
  • Charlie Savage Russia Investigation Transcript
    Charlie Savage Russia Investigation Transcript How inalienable is Stavros when unabbreviated and hippest Vernen obsess some lodgers? Perceptional and daily Aldrich never jeopardized his bedclothes! Nonagenarian Gill surrogates that derailments peeving sublimely and derogates timeously. March 11 2020 Jeffrey Ragsdale Acting Director and Chief. Adam Goldman and Charlie Savage c2020 The New York Times Company. Fortifying the hebrew of Law Filling the Gaps Revealed by the. Cooper Laura Deputy Assistant Secretary of Defense for Russia Ukraine and. Very quickly everything we suggest was consumed by the Russia investigation and by covering that. As part suppose the larger Crossfire Hurricane investigation into Russia's efforts. LEAKER TRAITOR WHISTLEBLOWER SPY Boston University. Forum Thwarting the Separation of The Yale Law Journal. Paul KillebrewNotes on The Bisexual Purge OVERSOUND. Pompeo confirms Russian bounty warning Harris' foreign. Charles Darwin like most 19th century scientists believed agriculture was an accident saying a bolster and unusually. Updates The petal of June 5 2017 Take Care. E OHCHR UPR Submissions. This followed a fetus between their Russian spies discussing efforts to page Page intercepted as part was an FBI investigation into this Russian sex ring in. Pulitzer Prize-winning journalist Charlie Savage's penetrating investigation of the. Propriety of commitment special counsel's investigation into Russian. America's Counterterrorism Gamble hire for Strategic and. Note payment the coming weeks that the definition of savage tends to be rescue not correct Maybe my best. It released last yeah and underlying testimony transcripts those passages derived from. Thy of a tale by Charles Dickens or Samuel Clemens for it taxed the.
    [Show full text]
  • Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border - Nytimes.Com
    6/4/2015 Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border - NYTimes.com http://nyti.ms/1dP5ida POLITICS Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border By CHARLIE SAVAGE, JULIA ANGWIN, JEFF LARSON and HENRIK MOLTKE JUNE 4, 2015 WASHINGTON — Without public notice or debate, the Obama administration has expanded the National Security Agency’s warrantless surveillance of Americans’ international Internet traffic to search for evidence of malicious computer hacking, according to classified N.S.A. documents. In mid-2012, Justice Department lawyers wrote two secret memos permitting the spy agency to begin hunting on Internet cables, without a warrant and on American soil, for data linked to computer intrusions originating abroad — including traffic that flows to suspicious Internet addresses or contains malware, the documents show. The Justice Department allowed the agency to monitor only addresses and “cybersignatures” — patterns associated with computer intrusions — that it could tie to foreign governments. But the documents also note that the N.S.A. sought permission to target hackers even when it could not establish any links to foreign powers. http://www.nytimes.com/2015/06/05/us/hunting-for-hackers-nsa-secretly-expands-internet-spying-at-us-border.html?emc=eta1&_r=0 1/6 6/4/2015 Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border - NYTimes.com The disclosures, based on documents provided by Edward J. Snowden, the former N.S.A. contractor, and shared with The New York Times and ProPublica, come at a time of unprecedented cyberattacks on American financial institutions, businesses and government agencies, but also of greater scrutiny of secret legal justifications for broader government surveillance.
    [Show full text]
  • Membership Lists, Metadata, and Freedom of Association's Specificity Requirement
    Membership Lists, Metadata, and Freedom of Association's Specificity Requirement KATHERINE J. STRANDBURG* Over the past year, documents revealed by leaker Edward Snowden and declassified by the government have provided a detailed look at some aspects of the National Security Agency's (NSA's) surveillance of electronic communications and transactions. Attention has focused on the NSA's mass collection from major telecommunications carriers of so-called "telephony metadata," which includes dialing and dialed numbers, call time, duration, and the like.' The goal of comprehensive metadata collection is what I have elsewhere called "relational surveillance"2-to follow "chains of communications" between "telephone numbers associated with known or suspected terrorists and other telephone numbers" and then to "analyze those connections in a way that can help identify terrorist * Alfred B. Engelberg Professor of Law, New York University School of Law. Professor Strandburg acknowledges the generous support of the Filomen D'Agostino and Max E. Greenberg Research Fund. 1 The term "metadata" has been widely adopted in discussing the NSA's data collection activities and so I will use it here. When one moves beyond call traffic data, however, the term's meaning in the data surveillance context is problematic, ill-defined and may obscure the need for careful analysis. As one illustration of these issues, consider NSA documents recently made public in connection with news reports of NSA monitoring of text messages, which refer, in language that would have made the Red Queen proud, to "content derived metadata." See James Ball, NSA DishfirePresentation on Text Message Collection-Key Extracts, THE GUARDIAN, Jan.
    [Show full text]
  • Summary of U.S. Foreign Intelligence Surveillance Law, Practice, Remedies, and Oversight
    ___________________________ SUMMARY OF U.S. FOREIGN INTELLIGENCE SURVEILLANCE LAW, PRACTICE, REMEDIES, AND OVERSIGHT ASHLEY GORSKI AMERICAN CIVIL LIBERTIES UNION FOUNDATION AUGUST 30, 2018 _________________________________ TABLE OF CONTENTS QUALIFICATIONS AS AN EXPERT ............................................................................................. iii INTRODUCTION ......................................................................................................................... 1 I. U.S. Surveillance Law and Practice ................................................................................... 2 A. Legal Framework ......................................................................................................... 3 1. Presidential Power to Conduct Foreign Intelligence Surveillance ....................... 3 2. The Expansion of U.S. Government Surveillance .................................................. 4 B. The Foreign Intelligence Surveillance Act of 1978 ..................................................... 5 1. Traditional FISA: Individual Orders ..................................................................... 6 2. Bulk Searches Under Traditional FISA ................................................................. 7 C. Section 702 of the Foreign Intelligence Surveillance Act ........................................... 8 D. How The U.S. Government Uses Section 702 in Practice ......................................... 12 1. Data Collection: PRISM and Upstream Surveillance ........................................
    [Show full text]
  • The Case Study of Crossfire Hurricane
    TIMELINE: Congressional Oversight in the Face of Executive Branch and Media Suppression: The Case Study of Crossfire Hurricane 2009 FBI opens a counterintelligence investigation of the individual who would become Christopher Steele’s primary sub-source because of his ties to Russian intelligence officers.1 June 2009: FBI New York Field Office (NYFO) interviews Carter Page, who “immediately advised [them] that due to his work and overseas experiences, he has been questioned by and provides information to representatives of [another U.S. government agency] on an ongoing basis.”2 2011 February 2011: CBS News investigative journalist Sharyl Attkisson begins reporting on “Operation Fast and Furious.” Later in the year, Attkisson notices “anomalies” with several of her work and personal electronic devices that persist into 2012.3 2012 September 11, 2012: Attack on U.S. installations in Benghazi, Libya.4 2013 March 2013: The existence of former Secretary of State Hillary Clinton’s private email server becomes publicly known.5 May 2013: o News reports reveal Obama’s Justice Department investigating leaks of classified information and targeting reporters, including secretly seizing “two months of phone records for reporters and editors of The Associated Press,”6 labeling Fox News reporter James Rosen as a “co-conspirator,” and obtaining a search warrant for Rosen’s personal emails.7 May 10, 2013: Reports reveal that the Internal Revenue Service (IRS) targeted and unfairly scrutinized conservative organizations seeking tax-exempt status.8
    [Show full text]
  • The Contributions of the Obama Administration to the Practice and Theory of International Law
    \\jciprod01\productn\H\HLI\57-2\HLI205.txt unknown Seq: 1 14-OCT-16 13:24 Volume 57, Number 2, Spring 2016 The Contributions of the Obama Administration to the Practice and Theory of International Law Jack Goldsmith* My aim in this essay is to give a tour of the horizon of the Obama admin- istration’s international law record in order to identify the distinctiveness of its approach and to tie it in to some general themes in international and foreign relations law. Due to his upbringing and education, Barack Obama came to the Presi- dency with a cosmopolitan outlook and an informed commitment to inter- national law. This attitude differed sharply from his predecessor, George W. Bush, who was suspicious of international law and generally viewed it as an obstacle to the exercise of American power. By contrast, Obama devoted a chapter of his 2006 book The Audacity of Hope to international relations and made plain that he understood international law intimately and viewed it as a constructive force in international relations.1 He criticized the view that “international law [was] an encroachment on American sovereignty [and] a foolish constraint on America’s ability to impose its will around the world”—a position that Obama associated with Henry Cabot Lodge, but one that might also describe the early Bush administration.2 And Obama argued it was “in America’s interest to work with other countries to build up international institutions and promote international norms . because the more international norms were reinforced and the more America sig- naled a willingness to show restraint in the exercise of its power, the fewer the number of conflicts that would arise.”3 On the campaign trail Obama gave voice to this attitude when he criticized the Bush administration for its weak compliance with U.S.
    [Show full text]
  • S. 1123, the USA Freedom Act of 2015 Dear Members of the Senate
    WASHINGTON LEGISLATIVE OFFICE May 23, 2015 RE: S. 1123, the USA Freedom Act of 2015 Dear Members of the Senate: Section 215 of the Patriot Act expanded the reach of the intelligence agencies in unprecedented ways and is the basis for collecting and retaining records on AMERICAN CIVIL millions of innocent Americans. The ACLU opposed Section 215 when it LIBERTIES UNION WASHINGTON was introduced, has fought it at each successive reauthorization, and urges LEGISLATIVE OFFICE Congress to let it sunset on June 1st. 915 15th STREET, NW, 6 TH FL WASHINGTON, DC 20005 T/202.544.1681 F/202.546.0738 This week, the Senate is scheduled to vote on S. 1123, the USA Freedom Act WWW.ACLU.ORG of 2015, which proposes modest reforms to Section 215, Section 214 (the pen MICHAEL W. MACLEOD-BALL register and trap and trace device provision, “PR/TT”), and national security ACTING DIRECTOR letter authorities. The bill also seeks to increase transparency over government NATIONAL OFFICE surveillance activities but could be construed to codify a new surveillance 125 BROAD STREET, 18 TH FL. regime of more limited, yet still massive scope. NEW YORK, NY 10004-2400 T/212.549.2500 Earlier this month, the Second Circuit unequivocally ruled that the OFFICERS AND DIRECTORS 1 SUSAN N. HERMAN government’s bulk metadata program violated the law. In light of this PRESIDENT decision, it is clear that more robust surveillance reform is needed. Though an ANTHONY D. ROMERO improvement over the status quo in some respects, the USA Freedom Act EXECUTIVE DIRECTOR does not go far enough to rein in NSA abuses and contains several concerning ROBERT REMAR provisions.
    [Show full text]
  • Introduction the Intelligence Community (IC) – General Information
    Guide to Posted Documents Regarding Use of National Security Authorities – Updated as of January, 2020 Contents Introduction .................................................................................................................................................. 1 The Intelligence Community (IC) – General Information .............................................................................. 1 IC Framework for Protecting Civil Liberties and Privacy and Enhancing Transparency ................................ 3 Reports on Use of National Security Authorities. ......................................................................................... 5 Section 702: - Overviews............................................................................................................................... 6 Section 702: Targeting and Minimization ..................................................................................................... 7 Section 702: Compliance, Oversight, and Other Documents ....................................................................... 8 FISA: Other Provisions ................................................................................................................................... 9 FISA: FISC and FISCR Opinions..................................................................................................................... 10 Executive Order 12333 ................................................................................................................................ 11 Presidential
    [Show full text]
  • May 26, 2021 the University of Oklahoma Delivered Via Email To
    1156 15th St. NW, Suite 1020 May 26, 2021 Washington, D.C. 20005 (202) 795-9300 www.rcfp.org The University of Oklahoma Bruce D. Brown Executive Director Delivered via email to: [email protected], [email protected], [email protected] (202) 795-9301 [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], STEERING COMMITTEE CHAIRMAN STEPHEN J. ADLER, Reuters [email protected], [email protected] STEERING COMMITTEE MEMBERS J. SCOTT APPLEWHITE The Associated Press Re: Reconsideration of Oklahoma Open Records Act request WOLF BLITZER CNN DAVID BOARDMAN To the University of Oklahoma Board of Regents and Open Records Office: Temple University THEODORE J. BOUTROUS, JR. Gibson, Dunn & Crutcher LLP I represent NonDoc Media in connection with a request for public records sought by MASSIMO CALABRESI Time Magazine Tres Savage under the Oklahoma Open Records Act (“ORA”), Okla. Stat. tit. 51, §§ MANNY GARCIA 24A.1-24A.32. NonDoc Media is a non-profit, award-winning media outlet in Austin American-Statesman EMILIO GARCIA-RUIZ Oklahoma that works on behalf of the public interest. Mr. Savage is the Editor in San Francisco Chronicle Chief and a seasoned reporter at NonDoc Media, where he covers a variety of topics JOSH GERSTEIN POLITICO including education. ALEX GIBNEY Jigsaw Productions SUSAN GOLDBERG On May 1, 2019, Mr. Savage submitted an ORA request (a copy of which follows at National Geographic JAMES GRIMALDI page two) to the University of Oklahoma for “[a]ny and all reports created by the law The Wall Street Journal firm Jones Day for the University of Oklahoma relating to David Boren or Jim LAURA HANDMAN Davis Wright Tremaine ‘Tripp’ Hall.” DIEGO IBARGÜEN Hearst KAREN KAISER The Open Records Office denied Mr.
    [Show full text]
  • Case 4:16-Cv-02041-HSG Document 68 Filed 08/23/18 Page 1 of 31
    Case 4:16-cv-02041-HSG Document 68 Filed 08/23/18 Page 1 of 31 1 AARON MACKEY (SBN 286647) [email protected] 2 NATHAN D. CARDOZO (SBN 259097) [email protected] 3 ELECTRONIC FRONTIER FOUNDATION 815 Eddy Street 4 San Francisco, CA 94109 Telephone: (415) 436-9333 5 Facsimile: (415) 436-9993 6 Attorneys for Plaintiff 7 ELECTRONIC FRONTIER FOUNDATION 8 UNITED STATES DISTRICT COURT 9 FOR THE NORTHERN DISTRICT OF CALIFORNIA 10 SAN FRANCISCO DIVISION 11 ELECTRONIC FRONTIER FOUNDATION, ) Case No. 16-cv-02041-HSG 12 ) Plaintiff, ) NOTICE OF MOTION AND CROSS 13 ) MOTION FOR PARTIAL SUMMARY v. ) JUDGMENT AND OPPOSITION TO 14 ) DEFENDANTS’ MOTION FOR ) UNITED STATES DEPARTMENT PARTIAL SUMMARY JUDGMENT 15 ) OF JUSTICE, ) Date: November 8, 2018 16 ) Time: 2:00 pm Defendant. ) Courtroom: Courtroom 2, 17 ) Oakland Courthouse ) Hon. Haywood S. Gilliam Jr. 18 19 20 21 22 23 24 25 26 27 28 i. i PLAINTIFF’S CROSS MPSJ AND OPP TO DEFENDANT’S MPSJ Case No. 4:16-cv-02041-HSG Case 4:16-cv-02041-HSG Document 68 Filed 08/23/18 Page 2 of 31 1 NOTICE OF MOTION 2 PLEASE TAKE NOTICE that on November 8, 2018 at 2:00 pm in Courtroom 2, 4th Floor, 3 United States Courthouse, 1301 Clay Street, Oakland, California 94612, Plaintiff Electronic Frontier 4 Foundation (“EFF”), will, and hereby does, cross move this Court for partial summary judgment. 5 6 Pursuant to Federal Rule of Civil Procedure 56, EFF seeks a court order requiring the 7 government to release records under the Freedom of Information Act, 5 U.S.C.
    [Show full text]
  • Stanford Students Create 'Do Not Track' Software 3 December 2010, by Adam Gorlick
    Stanford students create 'do not track' software 3 December 2010, By Adam Gorlick such as Firefox requests content or sends data using HTTP - the protocol that underlies the web - it can optionally include extra information called a "header." Do Not Track adds a header that signals the user does not want to be tracked. The technology can now be installed as an add-on for Firefox, and Mayer and Narayanan are working to make it operate with Chrome. Safari and Internet Explorer do not support their software. Once the add-on is installed, the user doesn't have to do anything else. Each time a website is visited, a do- "We always thought Do Not Track was a great technical not-track message is automatically sent. idea, and it has a real impact that's feasible," said Jonathan Mayer, one of two researchers who created The students, who have been working with the software. computer science Professor John Mitchell, are also creating ways to configure web servers to honor their code. As a government agency pushes for a "do not Sending businesses and advertisers the message track" mechanism to protect online consumer that you don't want to be tracked is one thing. But privacy, a pair of Stanford researchers is getting them to respect your privacy is another - developing the technology to make it work. and it's something that hinges on government enforcement. For about four months before Wednesday's release of the Federal Trade Commission's "At the end of day, Congress would probably have recommendations for increasing Internet privacy, to pass a law empowering the FTC to enforce this," Jonathan Mayer and Arvind Narayanan have been said Ryan Calo, director of the Consumer Privacy creating software that would let users opt out of Project for Stanford Law School's Center for third-party web tracking and tell advertisers to stop Internet and Society.
    [Show full text]